CN111837165A - Safety system for movable barrier operator - Google Patents

Safety system for movable barrier operator Download PDF

Info

Publication number
CN111837165A
CN111837165A CN201880083263.XA CN201880083263A CN111837165A CN 111837165 A CN111837165 A CN 111837165A CN 201880083263 A CN201880083263 A CN 201880083263A CN 111837165 A CN111837165 A CN 111837165A
Authority
CN
China
Prior art keywords
code
encrypted message
response
time window
fixed
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201880083263.XA
Other languages
Chinese (zh)
Other versions
CN111837165B (en
Inventor
J·J·菲茨吉本
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Thrall Car Manufacturing Co
Original Assignee
Thrall Car Manufacturing Co
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Thrall Car Manufacturing Co filed Critical Thrall Car Manufacturing Co
Priority to CN202410216482.8A priority Critical patent/CN118135696A/en
Publication of CN111837165A publication Critical patent/CN111837165A/en
Application granted granted Critical
Publication of CN111837165B publication Critical patent/CN111837165B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/10Movable barriers with registering means
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0853Network architectures or network communication protocols for network security for authentication of entities using an additional device, e.g. smartcard, SIM or a different communication terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3271Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response
    • H04L9/3273Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using challenge-response for mutual authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00309Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks
    • G07C2009/00412Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated with bidirectional data transmission between data carrier and locks the transmitted data signal being encrypted
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C2009/00753Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys
    • G07C2009/00769Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys operated by active electrical keys with data transmission performed by wireless means
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00817Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed
    • G07C2009/00849Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the lock can be programmed programming by learning
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00857Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed
    • G07C2009/00888Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys where the code of the data carrier can be programmed programming by learning
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07CTIME OR ATTENDANCE REGISTERS; REGISTERING OR INDICATING THE WORKING OF MACHINES; GENERATING RANDOM NUMBERS; VOTING OR LOTTERY APPARATUS; ARRANGEMENTS, SYSTEMS OR APPARATUS FOR CHECKING NOT PROVIDED FOR ELSEWHERE
    • G07C9/00Individual registration on entry or exit
    • G07C9/00174Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys
    • G07C9/00896Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses
    • G07C2009/00928Electronically operated locks; Circuits therefor; Nonmechanical keys therefor, e.g. passive or active electrical keys or other data carriers without mechanical keys specially adapted for particular uses for garage doors
    • GPHYSICS
    • G08SIGNALLING
    • G08CTRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
    • G08C2201/00Transmission systems of control signals via wireless link
    • G08C2201/40Remote control systems using repeaters, converters, gateways
    • G08C2201/41Remote control of gateways
    • GPHYSICS
    • G08SIGNALLING
    • G08CTRANSMISSION SYSTEMS FOR MEASURED VALUES, CONTROL OR SIMILAR SIGNALS
    • G08C2201/00Transmission systems of control signals via wireless link
    • G08C2201/60Security, fault tolerance
    • G08C2201/62Rolling code
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/2803Home automation networks
    • H04L2012/284Home automation networks characterised by the type of medium used
    • H04L2012/2841Wireless
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04QSELECTING
    • H04Q2209/00Arrangements in telecontrol or telemetry systems
    • H04Q2209/40Arrangements in telecontrol or telemetry systems using a wireless architecture

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Lock And Its Accessories (AREA)
  • Selective Calling Equipment (AREA)

Abstract

An electronic system for safely actuating a remote device, such as a movable barrier operator, is provided. The system solves the "man in the middle" problem of personnel intercepting and duplicating radio frequency signals from a control device by introducing timing parameters into a two-way communication sequence between at least two devices.

Description

Safety system for movable barrier operator
Cross Reference to Related Applications
This application claims the benefit of U.S. provisional patent application No. 62/608,977 filed on 21.12.2017, the entire contents of which are incorporated herein by reference.
Technical Field
The present invention relates generally to security systems that allow operation upon receipt of a suitably encoded signal. More particularly, the present invention relates to a security system or to a barrier operator system, such as a garage door operator, which employs a transmitter and a receiver that communicate via a code having at least a portion thereof that varies with operation of the transmitter.
Background
It is well known in the art to provide garage door operators or other barrier operators that include an electric motor that can be connected through a transmission to a door or other movable barrier to be opened and closed. Since many of these systems are associated with residences and garages, it is important that only persons authorized to gain access to the protected area of the barrier be allowed to open the barrier. In the past, some garage door operator systems have employed a mechanical lock and key arrangement associated with an electrical switch mounted outside the garage. While these systems enjoy a relatively high degree of tamper-resistance, they are inconvenient to use and may present a safety hazard by requiring the user to leave the vehicle to open the garage door.
It is known to provide radio controlled garage door operators which include a garage door operator unit having a radio receiver and a motor connected to a garage door. The radio receiver is adapted to receive radio frequency signals or other electromagnetic signals having particular signal characteristics that, when received, cause the door to open. Such systems may include radio transmitters that employ coded transmission of multi-valued numbers or ternary numbers (also referred to as "ternary bits"), or other serial coded transmission techniques. Among these systems is U.S. patent No. 3,906,348 to Willmott, which employs a transmitter and receiver system in which a plurality of mechanical switches may be used to set the stored authorization code.
United states patent No. 4,529,980 to Liotine et al discloses a combination transmitter and receiver for use in an apparatus such as a garage door operator, in which the transmitter stores an authorization code to be transmitted over a radio frequency link to and received by the receiver. In order to change or update the authorization code contained in the transmitter, the receiver is equipped with a programming signal transmitter or a light emitting diode that can send a digitized optical signal back to the transmitter where it is stored. Other systems that also employ coded transmission are U.S. patent nos. 4,037,201, 4,535,333, 4,638,433, 4,750,118 and 4,988,992.
While security systems have become more complex, persons who wish to gain unauthorized access to conduct property or person related crimes have also become more complex. Today, in the security industry, devices are known that can intercept or steal rolling codes.
Systems are known that include a code hopping encoder that produces a serial code having a fixed portion (i.e., that does not vary with repeated actuation of the encoded portion) and a rolling code portion that varies with each actuation of the encoded portion of the chip. To avoid that accidental activation of the transmitter when out of range of the receiver causes the transmitter rolling code to be permanently out of synchronization with the receiver and therefore unrecognizable by the receiver, these code hopping encoders provide a forward windowing system, i.e., they can be used with a system having a code receiver that recognizes as valid codes a plurality of rolling codes within a certain code window or window of values (rather than a single rolling code), which values are generated over a relatively small number of switch closings compared to the total number of rolling codes available. Examples include Keeloq model NTQ105, NTQ115, NTQ125D, and NTQ129 code hopping encoders by transequoial Technology, inc, and Mark Star TRC1300 and TRC1315 remote transmitter/receiver combinations by Texas Instruments. However, if the user leaves and inadvertently causes a code to be transmitted beyond the number of codes normally allowed in the valid forward code window, the receiver will not recognize the code and the user must circumvent the system, which may damage the system or require an engineer.
More recently, many movable barrier operators (e.g., garage door operators) use an activation code that changes after each transmission. This varying code, called the rolling access code, is created by the transmitter and acted upon by the receiver, both of which operate according to the same method to predict the next rolling access code to send and receive. One such rolling access code includes four parts: a fixed transmitter identification portion, a rolling code portion, a fixed transmitter type identification portion, and a fixed switch identification portion. In this example, the fixed transmitter identification is a unique transmitter identification number. The rolling code portion is a number that changes with each transmission to confirm that the transmission is not a recorded transmission. The fixed transmitter type identifier is used to inform the movable barrier operator of the transmitter type and characteristics. The switch identification is used to identify which switch on the transmitter was pressed, as there are systems in which the function performed differs depending on which switch was pressed.
There are also methods for pairing a remote control device with a barrier operator so that a user can purchase additional controls for use with a single barrier operator, or utilize controls integrated in a vehicle. When a movable barrier operator is installed, the premises owner will typically receive at least one handheld transmitter that has been trained to fit the operator. To operate the door from a newly learned transceiver, there is typically a two-step learning process to train the newly learned transceiver. The first step is to teach the learning transceiver the type of owner's handheld transmitter and possibly the code of the transmitter. While the owner holds the handheld transmitter several inches from the learning transceiver, while pressing the button on the learning transceiver, the button of the handheld transmitter is simultaneously pressed and held to teach the learning transceiver the type and frequency of the access code. The second step of the learning process is to train the learning transceiver to the operator. To do this, the learn button on the barrier operator must be pressed and the learning transceiver should be activated within a given time period. In another prior art method, these two steps are combined into one step or done simultaneously. In one example, a pre-trained transmitter transmits a code to the operator and the learned transceiver, both of which hold the code. Next, a button is pressed on the learned transceiver for a predetermined time to transmit a second rolling access code that is received by the operator and compared to the first rolling access code stored in the operator. The operator stores a representation of the second rolling access code from the learned transceiver if a predetermined correlation exists between the first rolling access code and the second rolling access code. According to this method, a pre-trained transmitter is required on the user to train the learned transceiver to the movable barrier operator to ensure that the user is authorized to enter the garage. Some systems even allow the universal transceiver to learn credentials from the movable barrier operator by establishing two-way communication between the universal transceiver and the movable barrier operator upon the occurrence of a predetermined event without the use of a pre-programmed transmitter.
However, there remains a need for an economical encoding system that provides enhanced security by combining the use of changing or rolling codes with additional measures to prevent or minimize interception and duplication of the codes during device use or pairing.
Disclosure of Invention
The present invention relates generally to an electronic system for providing safety for actuating a specific device. The system is useful, for example, in barrier operator systems such as garage door operators, which allow garage doors to be opened and closed in a relatively secure manner while preventing unauthorized access to the garage by personnel who may intercept radio frequency signals.
Systems and methods are provided in some forms that address the "man-in-the-middle" problem of personnel intercepting and replicating radio frequency signals from authorized devices (such as by using a "code grabber") by introducing timing parameters into a two-way communication sequence between at least two devices. The timing parameter may be, for example, a time delay or time window of a specified size or duration. If the first device communicates with the second device and a response is sent from the second device outside the time parameter, the response will be considered invalid or ignored by the first device. In this way, transmissions intercepted outside (i.e., before and after) a specified time window, which may be on the order of tens or hundreds of milliseconds, will be useless. By arranging the means to determine a time window based on the variable part of the relevant transmission (or a part or derivative thereof), the time window will vary from operation to operation and the security level is further increased.
In some embodiments, the system may include a first device configured to trigger a communication event and a subsequent response by another device. The first device may be, for example, a handheld or vehicle mounted transceiver, and may be user operated or triggered by a geo-fence, proximity detection, or other variable. Some forms of first apparatus may generally be configured for developing and transmitting a first encrypted message comprising a fixed code and a varying or variable code (e.g., a rolling code) via a wireless signal. With each actuation of the transceiver, the variable or changeable code is changed. The fixed code is static and remains the same for each actuation of the transceiver. The second device, e.g., an operator such as an electric garage door opener, receives the encrypted message, authenticates the message by comparing the fixed code and the varying or variable code to a stored value, which is preferably stored in a computer memory physically incorporated into the second device, and upon authentication sends a response signal including at least a second encrypted message having a second fixed code and a second varying code. The first device then receives and attempts to verify the second encrypted message, and in some embodiments, the first device is configured to transmit a third encrypted message to the operator device, the third encrypted message including the changed versions of the first fixed code and the second changing code. The third encrypted message is configured to cause the operator device to perform an action, such as raising or lowering a movable barrier structure.
In some forms there is provided a system for secure communication between a first device and a second device to cause the second device to act. In some embodiments, the first device includes a controller circuit; a transmitter in operable communication with the controller circuit; a receiver in operable communication with the controller circuit; and a user input device in operative communication with the controller circuit. The controller circuit of the first apparatus may be configured to: in response to detecting an input at the user input device, controlling the transmitter to transmit a first encrypted message, the first encrypted message comprising at least a first fixed code and a first varying code; receiving, by a receiver, a response from the second apparatus, wherein the response comprises a second encrypted message comprising a second fixed code and a second varying code; verifying the response by comparing the second fixed code and the second varying code with the second stored code value; and in response to the verification response, control the transmitter to transmit a third encrypted message comprising at least the changed versions of the first fixed code and the second changing code, wherein the third encrypted message is configured to cause the second apparatus to perform the action. In some embodiments, the second apparatus may include a controller circuit; a transmitter in operable communication with the controller circuit; a receiver in operable communication with the controller circuit; and a timer circuit in operative communication with the controller circuit. The controller circuit of the second apparatus may be configured to enable the receiver of the second apparatus to receive the first encrypted message; verifying the first encrypted message by comparing the first fixed code and the first varying code with the stored code value; determining when to transmit a response; controlling transmission of a response from a transmitter of the second apparatus in response to verifying the first encrypted message; enabling a receiver of the second device to receive the third encrypted message; verifying the third encrypted message by comparing the changed versions of the first fixed code and the second changed code to the stored code value; and causing an action to be performed in response to verifying the third encrypted message.
In some embodiments, at least one time window is associated with one or more encrypted messages and provides an additional layer of security and minimizes the chance that third parties will intercept transmissions and utilize the fixed and varying codes without the owner of the device agreeing. The time window may be determined with respect to a particular action, such as activation of the first apparatus, reception of a transmission by the second apparatus, etc., or alternatively may be determined based on an absolute time measurement (e.g., by determining the start and end of the window by reference to a clock). If absolute time measurements are used, the first device and the devices with which it communicates should be synchronized so that their absolute time measurements are substantially the same. In some such embodiments, the first and second devices each comprise a timer in operative communication with their respective controller circuits, and upon actuation, the first device determines a time window in addition to transmitting a first encrypted message comprising at least a first fixed code and a first varying code to expect receipt of a response within the time window. In some embodiments, the time window may be determined based on one or more code portions used to create the first encrypted message (e.g., a changing code portion of the message or one or more portions thereof) or based on an encrypted form of the message or one or more portions thereof. The second device receives and decrypts the first encrypted message and verifies the message by comparing its fixed and varying or variable codes to the stored value. The second device also determines a second time window based on the encrypted message to transmit the response to the user-operated transceiver in the second time window. The second time window may be the same as or within the time window determined by the first apparatus and may or may not be determined using the same portion of the encrypted message. The second time window may be a discrete point in time within the first time window.
In some embodiments, the second device sends a response signal to the first device within the second time window after the second device verifies the first encrypted message. The response signal includes at least a second encrypted message created from a second fixed code and a second varying code, which may, but need not, be independent of the first varying code. If the second encrypted message is received by the first device within the first time window, the first device will attempt to authenticate the second encrypted message by comparing the fixed code and the varying or variable code of the second encrypted message to a set of stored code values. In some embodiments, the first device may compare the time of receipt of the second encrypted message to a first time window and only continue to analyze signals or messages received within the first time window. Alternatively, to conserve power, the first apparatus may turn on and enable the receiver element at the beginning of the time window and turn off the receiver element at the end of the time window, such that the first apparatus is only able to receive transmissions from the second apparatus within the first time window. In such an embodiment, if the second encrypted message is sent and received outside the first time window, it will be ignored entirely. Once the response from the second apparatus is verified, the first apparatus in some embodiments may be configured to transmit third encrypted information that includes the changed versions of the first fixed code and the second change code. The third encrypted message is configured to cause the second device to perform an action, such as raising or lowering a movable barrier.
The fixed and variable codes may be of any selected length and may be modified or changed in various ways to add additional layers of security. In some examples, the transmitter may be configured to generate a frame comprising a specified number of bits of the fixed portion of the code and a second frame comprising the variable portion of the code. In some embodiments, the variable portion of the code (which may be a rolling code) may then be mirrored to provide a mirrored rolling code. The mirrored rolling code can then be "deleted" by setting its most significant bit to zero. The transmitter may then convert the fixed code and the mirrored rolling code into a ternary or ternary fixed code and a ternary or ternary rolling code. To provide further security, in some embodiments, the fixed and rolling codes may be shuffled or interleaved such that alternating bits consist of fixed and rolling code bits. A single synchronization and/or identification pulse may advance the first and second frames to indicate the start of the frame and whether it is the first or second frame.
Additionally or alternatively, in some embodiments, encrypting may include providing the variable code and a plurality of different data bit order patterns, providing a plurality of different data inversion patterns, selecting a particular one of each of the data bit order patterns and the data inversion patterns to provide a selected pattern, and transmitting at least a portion of the encrypted variable code using the selected pattern as a transmission characteristic. In some forms selecting a particular one of each of the data bit order pattern and the data inversion pattern to provide a selected pattern includes using a variable code to select the particular data bit order pattern and the data inversion pattern to provide the selected pattern.
A method of pairing a first device and a second device to establish secure communication between the first device and the second device to cause an action by the second device is also provided. The first device transmits a first encrypted message to the second device, the first encrypted message including at least a first fixed code and a first varying code. The first apparatus optionally also determines a time window in which to expect a response from the second apparatus, and the time window may be based on at least a portion of the first encrypted message. In some embodiments, the first device may enable the first device receiver to receive the response from the second device during the time window, or alternatively, the first device receiver may remain in an on state and compare a timestamp of the response to the time window. The second device receives the first encrypted message when the second device is in a "learn" mode in which the second device is waiting for a signal from the transmitter without information about the current version of the change code of the first device. While in the learning mode, the second device stores the first encrypted message and determines a time window in which to transmit a response to the first encrypted message. In some embodiments, the second device may have been manually placed into the learning mode by the user, such as by pressing a button, switch, or joystick on the second device, thus in some embodiments it may be desirable to manually activate both the first and second devices. The time window determined by the second apparatus may depend on one or more portions of the first encrypted message. The second device transmits its response to the first device within a time window determined by the second device, the response including a second encrypted message including at least a second fixed code. When the first device receives a second encrypted message of the response within the time window determined by the first device, the response is stored and the first device transmits a third encrypted message back to the second device, the third encrypted message including at least the first fixed code and the changed version of the first changed code. The second device receives the third encrypted message and verifies it by comparing the first fixed code and the changed version of the first changing code with the stored code value from the first encrypted message (the first fixed code and the first changing code), and upon verification (by confirming that the changed version of the first changing code is a forward change of the changing code from the first encrypted message), the second device then transmits a fourth encrypted message comprising the second fixed code and the second changing code (which may be independent of the first changing code). The first device receives the fourth encrypted message, verifies the fourth encrypted message by comparing the second fixed code and the second varying code to the response stored by the first device, and stores the second fixed code and the second varying code in response to verifying the fourth encrypted message.
The present system provides advantages over previous garage door operator systems and previous rolling code systems. Some systems according to the present invention provide enhanced security through two-way communications in which both the first and second devices transmit and receive independent codes to verify transactions between the devices on the user side and the operator side. Some embodiments provide enhanced security by linking information about the timing of subsequent transmissions to encrypted transmissions, and require that responsive transmissions be received within a specified time window as a prerequisite to code verification. These enhanced security measures may also be used in methods of pairing and/or synchronizing devices.
Drawings
FIG. 1 is a perspective view of an exemplary movable barrier operator system receiving control signals from a user-operated transceiver;
FIG. 2 is a block diagram of an example of the user-operated transceiver of FIG. 1;
FIG. 3 is a block diagram of an example of a movable barrier operator of the system of FIG. 1;
4A-C are flowcharts illustrating exemplary communication flows between a first device and a second device during normal operation;
5A-C are flow diagrams illustrating an example communication flow between a first device and a second device during a learning or pairing sequence;
FIG. 6 is a timing diagram of an example of a signal generated by a portion of a transmitter of one of the first and second apparatuses;
7A-C are flow diagrams illustrating examples of operation of a transmitter;
8A-F are flow diagrams illustrating an example of the operation of a receiver of one of the first and second apparatuses;
FIG. 8G is a schematic diagram of one example of bit processing used in encrypting messages;
FIG. 8H is a message diagram according to an example of an encrypted message;
9A-C are flow diagrams illustrating another example communication flow between a first device and a second device during normal operation;
fig. 10A-C are flow diagrams illustrating another example communication flow between a first device and a second device during a learning or pairing sequence.
Skilled artisans will appreciate that elements in the figures are illustrated for simplicity and clarity and have not necessarily been drawn to scale. Common but well-understood elements that are useful or necessary in a commercially feasible embodiment may be omitted for simplicity and/or clarity. It will also be appreciated that certain actions and/or steps may be described or depicted in a particular order of occurrence while those skilled in the art will understand that such specificity with respect to sequence is not actually required.
Detailed Description
The systems and methods described herein include a user-actuated first device, such as a handheld or vehicle-mounted transceiver, that is generally configured to form a first encrypted message that includes a fixed code and a variable or variable code (e.g., a rolling code). With each actuation of the transceiver, the variable or variable code changes according to a sequence or protocol of settings accessible by the first device and the second device with which it communicates. The fixed code remains the same for each actuation of the first device. The second device includes an operator mechanism, such as a garage door opener, to initiate one or more actions when commanded by the first device. The first and second devices may be configured to communicate with each other through various technologies, such as wired communication paths, radio frequencies, or any of various proprietary wireless platforms.
In some embodiments, the second device receives an encrypted message from the first device, authenticates the message by comparing the fixed code and the varying or variable code to a stored value, and upon authentication, transmits a response signal including at least a second encrypted message having a second fixed code and a second varying code independent of the first varying code. The stored values may represent, for example, fixed values and varying values from previous operations, where a sequence or algorithm associated with the varying code determines the varying code value. In some embodiments, the second device may identify the plurality of change code values as valid to account for accidental or invalid actuation of the first device (e.g., when out of range of the second device, or when interference prevents normal communication with the second device).
The first device receives and attempts to verify the second encrypted message, and in some embodiments, the first device is configured to transmit a third encrypted message to the second device, the third encrypted message including a changed version of the first fixed code and the second changed code. The third encrypted message is configured to cause the second device to perform an action, such as raising or lowering a movable barrier. Thus, communication between devices may involve two-way authentication of messages, where each of the two devices is configured to both transmit and receive messages and compare them to a stored value, such as a value from a previous communication between the devices. In some embodiments, the communication between the devices may involve additional message exchanges in order to further improve security, e.g. transmitting and verifying fourth and fifth encrypted messages containing fixed and changing codes.
In some embodiments, at least one time window is associated with the encrypted message to provide an additional layer of security and to minimize the chance that third parties will intercept transmissions and utilize the fixed and varying codes without the owner of the device agreeing. In some such embodiments, upon actuation, the first device also determines a time window in which to expect a response to be received when it transmits a first encrypted message comprising at least a first fixed code and a first varying code. In some embodiments, the time window may be determined based at least in part on encrypting one or more portions of the message, such that the time window itself acts as an additional layer of encryption. For example, a particular length of time may be associated with a particular value or number in a fixed code portion of a message, such that a particular time window is linked to the first device, or with a particular value or number in a varying code portion of a message, such that the time window varies with each actuation of the first device. The second device receives the encrypted message and authenticates the message by comparing the fixed code and the varying or variable code to the stored value. The second device then determines a second time window based on the encrypted message to transmit the response to the user-operated transceiver in the second time window, the second time window being the same as or within the time window determined by the first device and may or may not be determined using the same portion of the encrypted message. In some embodiments, the second time window may be a discrete point in time with or without error margin that lies within the first time window.
The second device transmits a response signal within a second time window when the second device verifies the encrypted message. The response signal comprises a second encrypted message, which may be, for example, a message comprising a second fixed code and a second varying code independent of the first varying code. The first device may be configured to ignore responses received by the first device outside the first time window, but to verify responses received within the time window calculated by the first device, thereby allowing the timing of the response signal from the second device to act as an additional layer of security verifying that the devices are authorized to communicate with each other. If the second encrypted message is received by the first device within the first time window, the user-operated device will verify the second encrypted message by comparing the fixed code and the varying or variable code of the second encrypted message to a set of stored code values. The first device may compare the time of receipt of the second encrypted message to the first time window and only continue to analyze signals received within the first time window. Alternatively, to save power, the first device transceiver may be turned on and enable the receiver portion to receive transmissions only within the first time window, such that if a second encrypted message is sent and received outside the first time window, it will be ignored entirely. In some embodiments, the time window is less than about 360 milliseconds, and in some embodiments, the time window begins tens or hundreds of milliseconds after it is determined by the first device. The time window is preferably short enough that there is no significant delay for the user between actuating the transmitter device and causing the requested action.
Upon verifying the response from the second apparatus, the first apparatus may be configured to transmit a third encrypted message, e.g., a third encrypted message including a changed version of the first fixed code and the second changed code. The third encrypted message is configured to cause the operator device to perform an action, such as raising or lowering a movable barrier structure. In some embodiments, the third message may also be associated with a time window and identified by the second device only when received within the calculated time window. The devices may also be configured to require authentication of the additional message before causing the second device to act.
Referring now to the drawings, and more particularly to fig. 1, a movable barrier operator system 10 is provided that includes a movable barrier operator 12 mounted within a garage 14 and a handheld transceiver 30. The operator 12 is mounted to a ceiling 16 of the garage 14 and includes a track 18 extending therefrom, the track 18 having attached thereto a releasable trolley 20 having an arm 22 extending to a multi-panel garage door 24, the arm 22 being positioned for movement along a pair of door tracks 26 and 28. The handheld transceiver unit 30 is adapted to transmit signals to and receive signals from the operator 12. An antenna 32 may be positioned on the operator 12 and coupled to a receiver as discussed below in order to receive transmissions from the handheld transceiver 30. An external control panel 34 may also be located outside of the garage 14, having a plurality of buttons thereon, and communicating with the antenna 32 of the operator 12 via radio frequency transmission. Optical emitter 42 may be connected to operator 12 by power and signal line 44 and optical detector 46 is connected to operator 12 by electrical line 48 to prevent door 24 from closing on a person or object that is inadvertently in the path of the door. A switch 300 may be provided for switching between modes such as an operating mode and a learning mode.
Referring now to fig. 2, a block diagram of a transceiver 30 is provided. The transceiver 30 includes a transmitter 206 and a receiver 207 (which may be combined into a single mechanism) in operative communication with antennas 220 and 221, respectively. The antenna may be positioned in, on, or extending from the user-operated transceiver 30, wherein the transmitter 206 and receiver 207 are configured to wirelessly transmit and receive transmission signals, including a transmission signal containing a first rolling access code having a fixed code portion and a rolling code portion, to and from the movable barrier operator 12. In some embodiments, both the transmitter and the receiver may be in communication with a single antenna or multiple antennas, and in some embodiments, both devices may be configured as a single transceiver device in communication with a single antenna. The user-operated transceiver 30 also includes a controller 202 in operable communication with the transmitter 206 and the memory 204, and is configured to process data and execute commands. The memory may be, for example, a non-transitory computer-readable medium and may store thereon instructions that, when executed by the controller circuit, cause the controller circuit to perform operations. The power source 205 is coupled to the controller 202 and/or other components, and in some embodiments may be routed such that the switch 31 couples/decouples the power source to the other components such that power is only provided when the switch 31 is activated or at a designated time thereafter. The controller 202 is configured to generate and cause the transmitter 206 to transmit a first rolling access code comprising at least one fixed code portion and at least one varying or rolling code portion for transmitting a signal, and the receiver 207 is configured to receive a responsive transmission. A timer 230 in communication with the controller 202 provides a way to determine when the input and output signals are transmitted and provides a reference for the controller 202 to enable and disable the transmitter 206 and/or receiver 207 of the device. The memory 204 is connected for operable communication with the controller 202 and is configured to store code and, in some embodiments, other information for output transmission. Memory 204 is also configured to store fixed code values and/or variable code values for comparison with incoming transmissions. The switch 31 may comprise one or more user operable switches for inputting commands to the transceiver 30, for example issuing barrier movement commands or learning commands. The switch 31 may be associated with a button, joystick or other device to be actuated, for example, by a user's hand or other action, event or condition. As other examples, the switch 31 may be voice-operated, or may be operated by a user contacting a touch-sensitive screen as a position of an object displayed on the touch-sensitive screen.
Referring now to fig. 3, in one example, the operator 12 includes a controller 302 in communication with a memory 304 and is configured to store data to and retrieve data from the memory 304, as well as process data and execute commands. A power source 305 (e.g., an AC power conduit, battery, or other known power source) provides power to the controller 302 to allow operation. The operator 12 also includes a wireless transmitter 306 and receiver 307 (or combination device) in operable communication with the controller 302. As shown, the transmitter 306 is in communication with a first antenna 320 and the receiver is in communication with a second antenna 321, but both devices may be in communication with a single antenna or multiple antennas, and in some embodiments the device may be configured with a single transceiver device in communication with a single antenna. The antenna may be positioned within the movable barrier operator 12, on the movable barrier operator 12, or extend from the movable barrier operator 12. In this regard, signals such as radio frequency or other wireless transmission carriers may be transmitted to and received from the user-actuated transceiver 30 according to various frequencies or modulations. The signal may be modulated in a number of different ways; accordingly, the transceiver 30 and the movable barrier operator 12 may be configured to communicate with each other via a variety of techniques. Controller 302 of operator device 12 also communicates with motor 340 to perform operations such as raising or lowering a garage door; sliding, swinging or revolving doors; or otherwise move or reposition the barrier structure. One or more switches 331 may be provided to override (override) the controller 302 or place the controller in or out of a learn mode in which the operator 12 may be paired with a user-operated device by exchanging and storing messages.
The term controller broadly refers to any microcontroller, computer, or processor-based device having a processor, memory, and programmable input/output peripherals, which are generally designed to manage the operation of other components and devices. It will also be appreciated that it includes the usual accompanying accessory devices. The controller may be implemented by one or more processors, microprocessors, central processing units, logic, local digital storage, firmware, software, and/or other control hardware and/or software, and may be used to perform or assist in performing the steps of the processes, methods, functions, and techniques described herein. Further, in some embodiments, the controller may provide multi-processor functionality. These architectural choices are well known and well understood in the art and need not be described further herein. The controller may be configured to perform one or more of the steps, actions and/or functions described herein (e.g., through the use of corresponding programs stored in memory, as will be readily understood by those skilled in the art).
In general, the controllers 202 and 302 may be similarly or independently configured, and each controller may comprise a fixed-purpose, hard-wired platform, or may comprise a partially or fully programmable platform. These architectural choices are well known and well understood in the art and need not be described further herein. The controller may be configured (e.g., by using corresponding programming as would be well understood by those skilled in the art) to perform one or more of the steps, actions, and/or functions described herein, and may store instructions, code, and the like, which are executed by the controller and/or processor to achieve the desired functionality. In some applications, the controller and/or memory may be distributed over a communication network (e.g., LAN, WAN, internet) that provides distributed and/or redundant processing and functionality. In some embodiments, the controller may include a processor and a memory module (such as in a microcontroller) integrated together. One or more power supplies may supply power to each controller and may be of any known type.
When the user actuates switch 31 of the user-operated transceiver 30 (e.g., by pressing a button designated to perform a particular action), the controller 202 activates the transmitter 206 to transmit a message via antenna 220 based on information stored in the memory component 204. The message is received by the receiver 307 of the operator device 12 and transmitted to the controller 302 of the operator. In some embodiments, the controller 302 validates the message by comparing it to stored information from the operator's memory module 304, and once validated, the controller 302 is configured to cause a response signal to be transmitted from the transmitter 306 through the antenna 320. If the message from the user-actuated transceiver 30 includes information relating to the timing parameters for the response, the controller 302 of the operator receives time information from the timer 330 in order to determine when to transmit the response in order to comply with the timing parameters of the user-actuated transceiver 30.
The user-actuated transceiver 30 may be configured to verify that the response from the operator 12 meets the transmitted timing requirements in any number of ways. In some embodiments, the controller 202 may compare a timestamp or other timing information related to the operator's response to the transmitted time parameter using the timer 230. In some embodiments, the receiver 207 is normally inactive, but is only turned on by the controller 202 for a short period of time that is consistent with the transmitted timing parameters. For example, the controller 202 may open the receiver 207 for a time window that matches the time window transmitted in the outgoing message by the transmitter 206, and upon expiration of the time window according to the timer 230, the controller 202 again closes the receiver 207. The timing information can be either relative, such as a specified number of seconds, milliseconds, or nanoseconds after the transmission of an output signal or other event, or absolute, such as standard date and time information for a particular time zone.
Once the response of operator 12 is received by receiver 207 at the appropriate time consistent with the specified timing parameters, user-actuated transceiver 30 may verify the response by comparing it to the stored information in its memory module 204. Once the response is verified, the user-actuated device 30 may transmit another message to the operator 12 via the transmitter 206. The third message is configured to cause the operator's controller 302 to actuate the motor 340 in order to perform the function associated with the actuation of the user-actuated device. Transceiver 30 may include a plurality of buttons, joysticks, switches, displays, microphones, speakers, or other inputs associated with different tasks to be performed by operator 12.
In another example, the movable barrier operator 12 may be paired with a user-actuated transceiver. The receiver 307 of the operator 12 is configured to receive an authorization signal indicating that it is authorized to communicate with the user-actuated transceiver 30 and to provide an indication to the controller 302 that it received the authorization signal. One or more switches 331 may be provided to open and/or otherwise allow the receiver 307 to receive the authorization signal. In response to receiving the authorization signal, the controller 302 is configured to generate a first rolling access code and store a representation of the first rolling access code in the memory device 304. The controller 302 is configured with a transmitter 306 to transmit a transmission signal comprising a first scrolling access code to the user actuated device 30. The receiver 307 also receives a transmission signal including a second rolling access code from the user-actuated transceiver 30, as further described below. In this example, the receiver 307 provides a transmission signal to the controller 302, and the controller 302 compares the second rolling access code to a representation of the first rolling access code stored in the memory device 304.
Fig. 4A, 4B and 4C are flow diagrams of interconnections showing steps of one example of a process in which signals are exchanged between first and second devices to verify authorization and perform activities. The steps to the left of the central dashed line relate to a first device, such as a user operated remote device, and the steps to the right relate to a second device, such as a movable barrier operator. For example, the first and second devices may be the transceiver 30 and the operator 12 previously discussed. In this example, a previous operation, such as a pairing procedure or sequence of operations, has been performed at an earlier time, such that each of the first and second apparatuses has stored information received from the other apparatus; the first operation of the device in the form of a pairing or synchronization sequence will be further explained below in connection with fig. 5A-5C.
Initially, both the first and second devices have stored in their memories a first fixed code and a first variable code from a previous operation involving the first device, and a second fixed code and a second rolling code from a previous operation involving the second device. The first device evaluates 401 whether it has been activated in a manner intended to cause the second device to act. For example, a user pressing a button on the first device may complete a circuit or cause a measurable change to at least one component of the first device. When the first device has not been activated, it will continue to wait for activation. Once activated, the first device transmits 403 a first message comprising at least a first fixed code and a first varying or variable code, which represents a modification of the first varying code in a previous operation. The first fixed code and/or the first variable code is now stored in the memory of the first device and may be encrypted using one or more encryption methods. The encryption method is not particularly limited, and may include one or more types of public or private key encryption, block cipher, stream cipher, and other techniques. In some embodiments, encryption may include the use of a predetermined number of bits of varying codes as a basis for selecting a particular data bit order pattern and a particular data inversion pattern. The first device also calculates 405 a time window in which it expects to receive a response, and this calculation may be done before or after the first device transmits the message. In some embodiments, the time window is calculated from at least a portion of the first encrypted message or from at least a portion of the unencrypted variable code, or from both.
At the same time, the second device has been placed in an operational mode and waits 402 for a signal to cause an action and, upon receiving 404 a first message from the first device, decrypts the message to obtain a first fixed code and a first variable code. The second device then stores the first fixed code and the first variable code and verifies the first fixed code and the first variable code by comparing 406 them to the stored code value. In this step, the first fixed code and the first variable code from the encrypted message are compared with the first fixed code and the variable code from the previous operation. A first encrypted message will be considered authenticated if the fixed codes match and the first variable code from the encrypted message matches a previous variable code modified according to a set of established variable code rules (e.g., matches a subsequent value from a predetermined sequence or algorithm). If the decrypted code value does not match the stored code value, the second device ignores the first message and waits 402 for additional signals. On the other hand, if the code value is valid in 407, the second device calculates 408 a response time window, such as a particular window or point in time, based on the first encrypted message. The response time may or may not be the same as the response window calculated 405 by the first device and may or may not use the same portion or portions of the first encrypted message and/or the first variable code. For example, the second device may use the same plurality of portions of the first fixed and/or first variable code to calculate the same time window calculated by the first device, or may be configured to read one or more portions of the first fixed or variable code to determine a response time that is entirely within the window calculated by the first device.
In response to verifying the first encrypted message, and after determining the response time window, the second device transmits a response 410 within the time window calculated in 408. The response includes a second encrypted message that includes a second fixed code and a second variant/variable code that, in the described embodiment, is independent of the first variant code and represents a modified version of the variable code from a previous operation. The second fixed code value and the modified second variable code value are stored in a memory of the second device, so at this stage the second device memory contains the first fixed and variable codes from the previous operation, the second fixed and variable codes from the previous operation, the first fixed and variable codes in the first encrypted message from the first device, and the second fixed and variable codes from the encrypted response.
The first device enables 409 the receiver during the time window calculated by the first device so that it can receive the encrypted response from the second device. If the second device sends a response outside the time window calculated by the first device, the signal will not be received at all because the first device receiver is turned off. However, if the second device sends a response during the calculated time window (in which the first device receiver is active), the first device will receive 411 and decrypt a second encrypted message that includes the second fixed code and the second varying/variable code. The second fixed code and the varying variable code are stored in a memory of the first device together with the second fixed and variable codes from the previous operation and the first fixed and variable codes from the first encrypted message. The first code from the previous operation is no longer needed and can be deleted from memory.
The first device then compares 412 the second fixed code and the second variable/change code to the fixed code and the variable code from the previous operation stored in the memory of the first device. The response message is validated if the second fixed code matches the fixed code from the previous operation and the second variable code matches the previous variable code modified according to a set of established variable code rules. If it is determined 413 that the second fixed code and the variable code are valid, the first device transmits 414 a third encrypted message that includes at least the changed versions of the first fixed code and the second changed code. If the first device is unable to verify the response from the second device, the flow ends and the first device returns to waiting 401 for a subsequent activation.
When the second device receives 415 the third encrypted message, the second device decrypts 415 the message to determine the changed versions of the first fixed code and the second variable code. These values are stored in the second device memory, which now contains the first fixed and variable codes from the previous operation, the first fixed and variable codes from the first encrypted transmission, the second fixed and variable codes from the previous operation, the second fixed and variable codes from the second encrypted (response) transmission, and the first fixed codes and the varying second variable codes from the third encrypted message. The second device then compares 416 the changed version of the first fixed code and the second variable code to a stored code value comprising the first fixed code and the unmodified second variable code to verify 417 the third encrypted message. Although the verification step may have a forward window of acceptable value (verification will occur when the received version of the change code is any one of the next several (e.g., 12) values expected in the sequence), security may be improved by reducing the size of or eliminating the forward window altogether. Thus, in some embodiments, the third encrypted message is only verified when it contains the next variable code value in the sequence. If the third message is verified, the second device performs 418 the requested action associated with the activation of the first device. If the second device is unable to verify the third message, the second device ends the flow without performing the requested action and returns to waiting 402 for a signal from the first device.
Turning now to fig. 5A-C, a flow diagram illustrates an example method of pairing a first device to a second device to synchronize, for example, a user-actuated device and an operator device for identifying and verifying a signal shared between the devices. The first device may be the transceiver 30 and the second device may be the operator 12 previously discussed. The method involves at least one apparatus learning a varying code sequence from another apparatus, and in some embodiments may involve two-way learning, such that each apparatus receives and stores a series of fixed code values and varying code values from another apparatus. In some embodiments, the devices may be configured such that the pairing method requires manipulation of a button or other actuator on each device, for example pressing a button on the garage door operator to place the device in a learn mode, and then pressing a button on the remote control device to initiate the pairing process.
In one form, the pairing method begins when the user activates 451 the first device while the second device has been placed 452 in a "learn" mode (e.g., by pressing a button or switching a joystick that is on or associated with the second device). First, the first device contains a first fixed code and a first variable code in its memory, and the second device contains a second fixed code and a second variable code. When the first device is activated, it transmits 453 a first encrypted message from the first device (the first encrypted message comprising at least a first fixed code and a first varying or varying code), and determines 455 a time window based on at least a portion of the first encrypted message in which to expect a response from the second device. The first device receiver is enabled 456 during the time window to receive a response from the second device. Meanwhile, the second device receives 454 the first encrypted message while the second device is in the learn mode and stores 457 the decrypted first fixed and first variable codes from the first encrypted message or portion thereof in a memory of the second device. The second device determines 458 a time window based on the first encrypted message to transmit the response in the time window. The second apparatus then transmits 459 a response within the time window, the response comprising a second encrypted message comprising a second fixed code from the second apparatus. If the first device receives 460 the second encrypted message within the time period calculated by the first device for the response, the second message is decrypted and the first device stores 461 a second fixed code. If no response is received from the first device within the time window, the message will be ignored and the pairing process stops.
After receiving the response from the second device within the time window and storing the associated value, the first device then transmits 462 a third encrypted message comprising at least the first fixed code and the altered version of the first variable code. The first device also enables 463 the receiver of the first device, in anticipation of receiving further communications from the second device. In some embodiments, this step of enabling 463 reception in the first device may include an associated time window derived from the third message.
When the second device receives 464 and decrypts the third encrypted message, the second device verifies the message by comparing 465 the changed versions of the first fixed code and the first variable code with the stored code value from the first encrypted message. If the second device determines 466 that the comparison is valid, the second device transmits 467 a fourth encrypted message that includes the second fixed code and the second varying code from the memory of the second device in response to verifying the third encrypted message.
The first device receives 468 the fourth encrypted message and verifies the fourth message by comparing 469 the second fixed code and the second varying code to the response stored by the first device. If the fourth message is determined 470 to be valid, the first device stores 471 a second fixed code and a second varying version of the second variable code in response to verifying the fourth encrypted message.
The variable or varying code transmitted by the first and second devices may be selected from those known in the art, such as a rolling code system, wherein the varying code is modified based on a preset algorithm and/or a predefined list or sequence of numbers. When a device verifies a change code by comparing it to a stored value, the device will typically compare the received code value to a number of expected subsequent values to account for activation of one device out of range of another device that otherwise would not result in communication with the other device. For example, in some embodiments, the apparatus will compare the received change code to at least twelve stored values, and in some embodiments, to at least 24, 48, 96, 128, or 256 stored values.
The fixed and varying codes for each message transmitted between devices may be encrypted and/or decrypted using a variety of methods and/or algorithms. In some forms the first device transmits the encrypted signal for operation or control of the second device by generating a radio frequency oscillating signal, generating a variable binary code, generating a ternary/ternary code responsive to the variable binary code, and modulating the radio frequency oscillating signal with the ternary code to produce a modulated ternary encoded variable radio frequency signal. To provide further security, in some embodiments, the fixed and rolling codes may be shuffled or interleaved such that alternating ternary bits are comprised of fixed and rolling code bits to produce, for example, a total of 40 ternary bits. The 40 ternary bits may then be packed in a first 20 ternary bit frame and a second 20 ternary bit frame. A single synchronization and/or identification pulse may advance the first and second frames to indicate the start of the frame and whether it is the first or second frame. The signal may be configured to comply with local laws and regulations; for example, immediately after each frame, the first device may be placed in a quiet state to maintain the average power of the transmitter at typical 100 millisecond intervals and within local regulations (e.g., within legal limits promulgated by the federal communications commission in the united states). The first ternary frame and the second ternary frame may be used to modulate a radio frequency carrier (e.g., via amplitude modulation) to produce an amplitude modulated encrypted signal. The amplitude modulated encrypted signal may then be transmitted and may be received by the second apparatus.
In some embodiments, the second device receives the amplitude modulated encrypted signal and demodulates it to produce a pair of ternary bit encoded frames. The ternary bits in each frame may be converted in substantially real time to 2-bits or nibbles indicating the value of the ternary bits, which may ultimately be used to form two 16-bit fixed codewords and two 16-bit variable codewords. These two 16-bit fixed code words may be used as pointers to identify the location of previously stored variable code values within the operator. Two 16-bit rolling codewords can be concatenated by taking the 16-bit word with the more significant bits, multiplying it by 310, and then adding the result to the second word to generate a 32-bit encrypted variable code. The 32-bit encrypted code may then be compared to the stored variable code by binary subtraction. If the 32-bit code is within a window or fixed count, the microprocessor of the second device may generate an authorization signal, and then the other portions of the circuitry of the second device may respond to the authorization signal, thereby causing the garage door to open or close as commanded. If the code is greater than the stored rolling code plus a fixed count (which represents a relatively large incremental number), the user may be allowed to provide other signals or indicia to the receiver to establish authorization, rather than being locked, which does not significantly reduce security. This may be done by the receiver entering an alternative mode using two or more consecutive active codes to be received (instead of just one). If two or more consecutive valid codes are received in this example, the operator will be actuated and the garage door will open. However, in such embodiments, to prevent a person who previously or recently recorded the most recent valid code from being able to gain access to the garage, the tail window is compared to the received code. If the received code is within this tail window, the system responds by simply not taking any further action, nor providing authorization during the code period, as this indicates that the code has been stolen.
Fig. 6-8 illustrate one potential encryption/decryption scheme. Fig. 6 is an example of a ternary code that is actually used to modify a radio frequency oscillating signal. In the depicted example, the bit timing of 0 is a fall time of 1.5 milliseconds and a rise time of 0.5 milliseconds, the bit timing of 1 is a fall time of 1 millisecond and a rise time of 1 millisecond, and the bit timing of 2 is a fall time of 0.5 millisecond and a rise time of 1.5 milliseconds. The rise time is actually the active time at which the carrier is generated. The fall time is an inactive time at which the carrier is switched off. The code is assembled in two frames, each frame having 20 ternary bits, where the first frame is identified by a 0.5 millisecond sync bit and the second frame is identified by a 1.5 millisecond sync bit.
Referring now to fig. 7A-7C, a flow chart is presented describing a form of generating a rolling code encrypted message from a first device to be transmitted to a second device. In step 500, the rolling code is incremented by three and then stored 502 for the next transmission from the device when the button is pressed. The order of the binary digits in the rolling code is reversed or mirrored at step 504, and the most significant bits are then converted to zeros at step 506, effectively truncating the binary rolling code. The rolling code is then changed to ternary code with values 0,1 and 2 and the initial ternary rolling code bit is set to 0. In some forms, a ternary code is actually used to modify the radio frequency oscillating signal, and an example of a ternary code is shown in fig. 6. It is to be noted that, in fig. 6, the bit timing of 0 is a falling time of 1.5 msec and a rising time of 0.5 msec, the bit timing of 1 is a falling time of 1 msec and a rising time of 1 msec, and the bit timing of 2 is a falling time of 0.5 msec and a rising time of 1.5 msec. The rise time is actually the active time at which the carrier is generated or transmitted. The fall time is an inactive time at which the carrier is switched off. The code is assembled in two frames, each frame having 20 ternary bits, where the first frame is identified by a 0.5 millisecond sync bit and the second frame is identified by a 1.5 millisecond sync bit.
In step 510, the next highest power of3 (next highest power of3) is subtracted from the rolling code and a test is made in step 512 to determine if the result is greater than zero. If so, the next most significant bit of the binary rolling code is incremented in step 514, and the method returns to step 510. If the result is not greater than 0, the next highest power of3 is added to the rolling code in step 516. In step 518, another highest power of3 is increased, and in step 520, a test is determined as to whether the rolling code is complete. If false, control loops back to step 510. If the rolling code is complete, step 522 clears the bit counter. In step 524, the blanking timer is tested to determine if it is in an active state. If not, the bit counter is incremented in step 532. However, if the blank timer is active, then a test is made in step 526 to determine if the blank timer has expired. If the blank timer has not expired, control is transferred to step 528 where the bit counter is incremented and control is then transferred back to decision step 524. If the blank timer has expired, as measured in decision step 526, the blank timer is stopped in step 530 and the bit counter is incremented in step 532. The bit counter is then tested for odd or even numbers in step 534. If the bit counter is not even, control is transferred to step 536 where the divide-by-2 output bit of the bit counter is fixed. If the bit counter is even, the divide-by-2 output of the bit counter is scrolled in step 538. The bit counter is tested to determine if it is set equal to 80 in step 540-if yes, a blank timer is started in step 542, but if not, the bit counter is tested to be equal to 40 in step 544. If so, the blank timer is tested and started in step 546. If the bit counter is not equal to 40, control is transferred back to step 522.
Referring now to fig. 8A-8F, and in particular fig. 8A, one example of the processing of an encrypted message from a first device by a second device is given. In step 700, an interrupt is detected and operated on. The time difference between the last edges is determined and the radio inactivity timer is cleared in step 702. It is determined in step 704 whether this is an active time or an inactive time, i.e. whether a signal is being transmitted with the carrier. If this is an inactive time, indicating no carriers, then control is transferred to step 706 to store the inactive time in memory and the routine is exited at step 708. If it is an active time, the active time is stored in memory in step 710 and the bit counter is tested in step 712. If the bit counter is zero, control is transferred to step 714, as best seen in FIG. 8B, and a test is made to determine if the inactivity time is between 20 and 55 milliseconds. If not, the bit counter and the rolling code register and fixed code register are cleared at step 716, and the routine exits at step 718.
If the inactivity time is between 20 and 55 milliseconds, a test is made in step 720 to determine if the activity time is greater than 1 millisecond, as shown in FIG. 8C. If not, a test is made in step 722 to determine if the inactivity time is less than 0.35 milliseconds. If so, a frame 1 flag is set in step 728, the input information is identified as being associated with frame 1, and the interrupt routine is exited in step 730. In the event that the active time test is not less than 0.35 milliseconds in step 722, the bit counter and the rolling code and fixed registers are cleared in step 724 and the return is exited in step 726. If the active time tested in step 720 is greater than 1 millisecond, a test is made in step 732 to determine if the active time is greater than 2.0 milliseconds, and if not, the frame 2 flag is set in step 734 and the routine is exited in step 730. If the active time is greater than 2 milliseconds, the bit counter rolling code register and fixed code register are cleared in step 724 and the routine is exited in step 726.
In the event that the bit counter test indicates that the bit counter is not 0 at step 712, then control is taken to set 736, as shown in FIG. 8A. The active and inactive periods are tested to determine if they are both less than 4.5 milliseconds. If any period is not less than 4.5 milliseconds, the bit counter and the rolling code register and fixed code register are cleared. If both are equal to or greater than 4.5 milliseconds, then in step 738, the bit counter is incremented and the active time is subtracted from the inactive time, as shown in FIG. 8D. In step 740, it is determined whether the result of the subtraction is less than 0.38 milliseconds. If they are bit values, then the bit values are set equal to zero in step 742, and control is transferred to decision step 743. If the result is not less than 0.38 milliseconds, a test is made in step 744 to determine if the difference between the active time and the inactive time is greater than 0.38 milliseconds, and control is then transferred to step 746 where the bit value is set equal to 2. Both bit values set in steps 742 and 746 involve a conversion from three-level ternary bits 0,1 and 2 to a binary number.
If the result of step 744 is negative, then the bit value is set equal to 1 in step 748. Control is then passed to step 743 to test whether the bit counter is set to odd or even. If set to odd, control is transferred to step 750 where the fixed code (which indicates that the bit is an odd bit in the sequence of frames rather than an even bit, meaning that it is one of the interleaved rolling code bits) is multiplied by three and then the bit value is added.
If the bit counter indicates that odd ternary bits are being processed, the existing rolling code register is multiplied by 3 and the ternary bit values obtained from steps 742, 746, and 748 are then added. Whether step 750 or step 752 occurs, then the bit counter value is tested in step 754, as shown in FIG. 8E. If the bit counter value is greater than 21, the bit counter rolling code register and fixed code register are cleared in step 758, and the routine exits. If the bit counter value is less than 21, then a return is made from the interrupt sequence in step 756. If the bit counter value is equal to 21, indicating that a sink bit (sink bit) plus a ternary data bit has been received, then a test is made in step 760 to determine if the sink bit indicates a first frame or a second frame, if it indicates a first frame, the bit counter is cleared and set for second frame completion, then a return is made from the routine in step 762. In the event that the determination at step 760 indicates that a second frame is received, the scrolling contributions of the two frames are added together to form a complete, inverted scrolling code. The rolling code is then inverted or mirrored in step 764 to recover the rolling code counter value. A test is made in step 766 to determine if the program mode has been set. If so, control is transferred to step 768 and the code is compared to the last received code at step 768. If there is no match, another code will be read until two consecutive codes match, otherwise the program mode is terminated. At step 770, the code is tested such that the fixed code is tested for matching with the fixed code non-volatile memory. If there is a match, the scrolling part is stored in memory. If not, the scrolling portion is stored in non-volatile memory. Control is then transferred to step 772, the program indicator is turned off, program mode is exited, and return is made from the interrupt. In the event that the test at step 766 indicates that the program mode has not been set, the program indicator is turned on at step 774 as shown in FIG. 8F. In step 776, the code is tested to determine if there is a match for the fixed portion of the code. If not, the program indicator is turned off and the routine exits in step 778. If there is a match, the counter indicating the rolling code is tested to determine if its value is greater than the stored rolling code by a factor or by less than 3,000 (which indicates a time interval of 1000 button presses to the first device). If not, a test is made in step 786 to determine if the last transmission from the same first device has a rolling code two to four less than the received portion, and if true, whether the stored value minus the received rolling code counter value is greater than 1,000. If so, control is transferred to step 782 to turn off the program indicator and set the operating command word which causes the command signal to operate the garage door operator. The receive timeout timer is cleared and the rolling code counter value is stored in non-volatile memory, and the routine exits in step 784. If the difference is not greater than 1,000 in step 786, then a return is immediately made from the interrupt in step 784. In the event that the counter test in step 780 is positive, then steps 782 and 784 are performed thereafter.
Fig. 8G and 8H are a schematic diagram of bit processing and parsing (fig. 8G) and an example message diagram (fig. 8H) according to one example configuration to form an encrypted message. This provides an example where a fixed code portion and a variable (e.g., rolling) code portion may be used to form an encrypted message. Referring now to FIG. 8G, an illustrative embodiment of bit processing and parsing will be presented. In this example, the unique substantive content to be associated with and transmitted by the 28-bit rolling code 790 comprises a 40-bit value representing the fixed information 791. The fixed information 791 may, for example, be used to uniquely identify the transmitter that will ultimately transmit the information. In this embodiment, the resulting encrypted rolling code 793 is provided by encrypting 792 the bits comprising the rolling code 790 by mirroring those bits, and then converting those mirrored bits to ternary values as described above to provide corresponding bit pairs (which in this example would comprise 18 such bit pairs). The mirroring may be applied to a specific grouping of bits in the rolling code, creating a mirror group, or may refer to the entire value. In this illustrative example, the encrypted rolling codes 793 are presented as four groups for further processing. In this example, the four groups include a rolling group E793A of four binary bit pairs, a rolling group F793B of five binary bit pairs, a rolling group G793C of four binary bit pairs, and a rolling group H793D of five binary bit pairs.
Although there is no encryption in this embodiment, the 40-bit fixed information 791 is subdivided in a similar manner. In this particular illustrative method, this includes forming four sub-groups, including fixed group A794A, fixed group B794B, fixed group C794C, and fixed group D794D, where each such group consists of 10 bits of the original 40-bit value.
These differently partitioned data groups may then be used to cause the desired transmission as shown in fig. 8H. In this example, one or more unification messages 795 provide a primary propagation medium through which desired information (including encrypted rolling codes and fixed information data (which is modified according to a given portion of the encrypted rolling codes), as well as recovery identifiers representing the given portion of the encrypted rolling codes) is communicated. Generally, the join message 795 includes a first 20-bit portion 796 and a second 30-bit portion 797.
In this embodiment, the first portion 796 includes the following fields: "0000" -these bits 796A are used for the precharge decoding process and effectively establish the operational threshold; "1111" — these bits 796B contain two bit pairs that exhibit an illegal state "11" ("illegal" because it corresponds to the fourth unallocated state in the ternary context of these communications) and are used here as a basis for facilitating synchronization with the receiving platform; "00" -this bit pair 796C identifies the type of payload carried by the consolidated message (in this embodiment, "00" corresponds only to the fixed identification information of the transmitter itself and "01" corresponds to the complementData-only loads, "10" corresponds to supplemental data-only loads-see below for further explanation of these load types); "Xx"
Figure BDA0002550997120000261
This bit pair 796D represents a frame identifier that may be used by the receiver to determine whether all required joint messages 795 have been received, and may also be used to facilitate proper reconstruction of the transmitted data; "B3, B2, B1, B0" -these two-bit pairs 796E include an inversion mode recovery identifier and are selected from the bits comprising the encrypted rolling code 793 described above; "B7, B6, B5, B4" -these two-bit pairs 796F include a bit order pattern recovery identifier and are also selected from the bits comprising the encrypted rolling code 793 described above.
There are a number of ways in which these resume identifier values may be selected. By one approach, a specified number of bits may be selected from the encrypted rolling group to form a corresponding rolling subgroup. These may include, for example, encrypting the first or last eight bits (forward or reverse order) of the rolling group. These may also include, for example, any eight consecutive bits starting at any preselected bit position. Other possibilities also exist. For example, only even position bits or odd position bits may be suitable for this aspect. For example, it is also possible to use preselected bits as a subset of a rolling group comprising one or more of the previously described.
It is also possible to change the selection mechanism from, for example, a join message to a join message. By a simple approach in this regard, for example, the first eight bits of the encrypted rolling group 793 may be used to form the rolling subgroup, while the last eight bits of the encrypted rolling group 793 are used in a similar fashion in an alternating fashion. The bits comprising the rolling subset may then be further parsed to form two recovery identifiers. These recovery identifiers may be used in conjunction with one or more look-up tables to determine a data bit order pattern for formatting data to include a portion of a consolidated message. In some embodiments, the rolling group used to form the recovery identifier does not appear in the consolidated message.
Fig. 9A, 9B, and 9C are flowcharts of an interconnect showing more specific examples of the process discussed above with respect to fig. 4A-C. In this example, a first device (e.g., a handheld or in-vehicle transceiver) commands a second device (e.g., a garage door operator) to take an action through encrypted transmission of a rolling code. Throughout fig. 9A-C, "1F" refers to a first fixed code, "1R" refers to a first rolling code, "2F" refers to a second fixed code unrelated to 1F, and "2R" refers to a second rolling code unrelated to 1R. "1A", "2A", and "3A" each refer to an "added value" that represents a value added to the rolling code or one or more scrolls of the rolling code. 1A, 2A and 3A may be the same or different.
Initially, both the first and second devices have stored in their memories a first fixed code and a first variable code from a previous operation involving the first device, and a second fixed code and a second rolling code from a previous operation involving the second device. When a user activates a first device in a manner intended to cause a second device to act, such as by pressing an activation button (first step 801), the first device creates a first message that includes a first fixed code (1F) corresponding to the first device and a first changed version (1R +1A) of the first rolling code that represents the rolling code value from the previous operation as modified by a first changing protocol, i.e., an algorithm that cycles through a specified number of codes one by one or calculates a new value from an initial rolling code value. The changed code (1F1R +1A) is stored in the memory of the first device and is also encrypted using one or more encryption methods for transmission to the second device (step 803). At this time, the initial value of the rolling code (1R) may be optionally deleted from the device memory. The first device also determines 805 a time window (W) or delay in which to expect to receive a response. The time window (W) may be determined from one or both of the rolling code values (1R and/or 1R +1A) or a portion thereof, or from the encrypted message or a portion thereof. For example, 1R +1A may include a time within a particular portion of its sequence, or the first device may apply an algorithm to 1R +1A, or one or more portions thereof, to calculate the time value of W. For example, the transmission characteristics of the recovery identifier (e.g., 796E and/or 796F in fig. 8H), a portion of the encrypted change code portion (e.g., a portion 797 in fig. 8H), and/or a portion of the decrypted change code value may determine the beginning and end of the time window. The time window W may represent a relative time period (e.g., from a particular action such as an initial button press or a first encrypted signal transmission, at the beginning and end of a particular time interval) or an absolute time period (e.g., based on a time value from a time device of (or in communication with) the first device that is synchronized with a time device of (or in communication with) the second device).
The second device, which is in an operating mode and is waiting for a signal (step 802), receives a first encrypted message from the first device, decrypts the message to obtain the first fixed code and the first variable code (1F1R +1A) and stores the new values in its memory (step 804). The second device then compares the first fixed code and the first variable code (1F1R +1A) received from the first device to expected values based on the stored code values (e.g., by applying the same algorithm used by the first device to the previous first device value (1F 1R) stored in the memory of the second device) (step 806). When comparing the received value with the stored value, the second device will perform an authentication step 807. If the fixed code matches and the received first rolling code (1R +1A) matches the expected value based on the stored rolling code (1R), the second device will continue to communicate with the first device. To account for accidental triggering of the first and/or second devices, the use of multiple first devices with the second device, or other situations where the rolling code received from the first device may not exactly match the expected value, this verification step preferably compares the received rolling code (1R +1A) with a set number of values in a series of values that fall within the sequence before and/or after the expected value (i.e., within a window of specified size around the expected value), and if the received rolling code matches any value in the series, the message from the first device is considered valid. Thus, when one device is not within range of another device, activating it will not cause the two devices to lose synchronization altogether and make communication impossible. If the decrypted code value does not match the stored code value, the second device ignores the first message and returns to step 802.
If the received message is verified, the second device calculates 808 a response time window. As illustrated in fig. 9A, in step 805, the second device calculates the same time window (W) in the same manner as the first device calculates. In other embodiments, the window or delay calculated at step 808 may be different, such as a shorter time window within W, or a single point in time that falls with W, and may even be calculated or determined from 1R, 1R +1A, and/or different portions of the encrypted message.
In response to verifying the first encrypted message, and after determining the response time window, the second device transmits 810 a response within the calculated response time window. The response comprises a second encrypted message originating from a second fixed code (2F) and a second rolling code (2R +2A) corresponding to the second device, independent of the first variation code, and representing a modified version of the second variation code (2R) from the previous operation. These values are stored in the memory of the second device, so at this stage the second device memory contains the first fixed and variable code (1F 1R) from the previous operation, the second fixed and variable code (2F2R) from the previous operation, the first fixed and variable code (1F1R +1A) from the first encrypted message sent by the first device, and the second fixed and variable code (2F2R +2A) from the encrypted response.
The first device enables the receiver during the time window determined (step 809) by the first device so that it can receive the encrypted response from the second device if the response arrives at the first device within the determined time window (W). If the response is sent outside of Wo, or for some other reason reaches the first device outside of Wo, the response will be ignored because the first device receiver is inactive or programmed to ignore the input signal. Assuming the first device receives a response within W, the first device will decrypt the second encrypted message to determine a second fixed code and a second rolling code (2F, 2R +2A) (step 811). These values (2, 2R +2A), together with the second fixed and variable code (2F2R) from the previous operation and the first fixed and variable code (1F1R +1A) from the first encrypted message, are stored in the memory of the first device.
The first device then compares the second fixed code and the second rolling code (2F2R +2A) to the fixed code and the variable code (2F2R) from the previous operation stored in the memory of the first device (step 812). The first device will then perform a verification step (step 813) which is similar to the verification step performed by the second device at step 807. The response message is considered validated if the second fixed code matches the fixed code from the previous operation and the second variable code (2R 2A) matches the previous variable code modified according to a set of established variable code rules, taking into account a predetermined accepted amount of errors (e.g., a look-ahead window). If the second fixed code and variable code (2F2R +2A) are determined to be valid (step 813), the first device generates a message that includes at least the changed version of the first fixed code and the second rolling code (1F 2R +3A), encrypts the message by applying an algorithm (which may or may not be the same as the algorithm used at step 803 and/or step 810) to the rolling code value (2R +2A) received from the second device to create a third encrypted message, stores the new value in its memory, and transmits the third encrypted message to the second device (step 814). If the first device is unable to verify the response from the second device, the flow ends and the first device returns to waiting for subsequent activation (801).
The second device receives and decrypts 815 the third encrypted message to determine a changed version (1F 2R +3A) of the first fixed code and the second variable code. The second device then compares the fixed codes from the first and third encrypted transmissions to confirm that they were transmitted by the same first device, and compares the rolling code from the third encrypted message to an expected value based on the last stored value of the second rolling code (2R +2A from the second encrypted message) (step 816). In a verification step similar to those discussed above, the second device then determines 817 whether the third encrypted message is valid. If the third message is verified, the second device performs 818 the requested action associated with the activation of the first device. If the second device cannot verify the third message, it ends the flow without performing the requested action and returns to step 802 to wait for a signal from the first device.
Fig. 10A-C illustrate one example of a particular method of pairing a first device with a second device, which corresponds to the more general method illustrated in fig. 5A-C. In this example, a first device (e.g., a user-actuated device) and a second device (e.g., an operator device for performing a particular action) are synchronized in order to identify and verify a signal shared between the devices at both ends. Throughout fig. 10A-C, "1F" refers to a first fixed code, "1R" refers to a first rolling code, "2F" refers to a second fixed code unrelated to 1F, and "2R" refers to a second rolling code unrelated to 1R. "1A", "2A", and "3A" each refer to an "added value" that represents a value added to the rolling code or one or more scrolls of the rolling code. 1A, 2A, 3A may be the same or different. Each of these values need not be the same as those in fig. 9A-C.
The pairing process begins when the first device is activated (e.g., by a user pressing a button on the device) (step 851), while the second device has been placed in a "learn" mode (step 852) (e.g., by pressing a button or switching a joystick associated with the second device). First, the first device contains in its memory a first fixed code (1F) and a first variable code (in this case a rolling code 1R) which represent the initial values or values from previous operations of the first device, and the second device contains a second fixed code (2F) and a second variable code (in this case a rolling code 2R) which represent the initial values or values from previous operations. The fixed codes are respectively associated with and identify their respective devices, while the rolling codes are independent of each other. When the first apparatus is activated, it generates a first encrypted message from the first fixed code and a modified version of the first rolling code (1F1R +1A) (step 853), and determines a time window (W) based on the first rolling code or at least a portion of the first encrypted message, in order to expect a response from the second apparatus in the time window (W) (step 855). The time window may be defined by the first rolling code or a value within the first encrypted message, or may be calculated therefrom based on an algorithm. The first device receiver is enabled to receive a response from the second device during the time window (step 856).
Meanwhile, the second device receives the first encrypted message while the second device is in the learn mode (step 854), and stores the decrypted first fixed and first variable codes (1F1R +1A) from the first encrypted message (or portion thereof) in a memory of the second device (step 857). The second device determines a time window based on the first encrypted message and/or the first rolling code to transmit a response in the time window (step 858). The time window determined by the second apparatus may be the same as or within W determined by the first apparatus at step 855 and may be determined in the same or a different manner. The second device then transmits a response within the determined time window (step 859), the response including the encrypted versions of the second fixed code (2F) and the second rolling code (2R). Optionally, a second rolling code, independent of the first rolling code, may be included in the second encrypted message. The second rolling code may, for example, start with a minimum value, such as 00. If the first device receives the second encrypted message within the time period W calculated by the first device for the response, the second message is decrypted (step 860) and the first device stores the second fixed code (and optionally the second variable code if it was sent) (step 861). If no response is received from the first device within the time window, the message will be ignored and the pairing process stops, and the first and second devices return to steps 851 and 852, respectively.
After receiving the response from the second apparatus within the time window W and storing the correlation values, and either being set to the learning mode by the activation switch or receiving the learning indicator from the second apparatus, the first apparatus then transmits a third encrypted message comprising at least the first fixed code (1F) and the changed version of the first changed code (1R +2A) (step 862). The first device also enables a receiver of the first device in anticipation of receiving further communications from the second device. In some embodiments, this step of enabling reception in the first apparatus (step 863) may comprise an associated time window derived from the third message.
When the second device receives and decrypts the third encrypted message (step 864), it validates the message by comparing the first fixed code and the changed version of the first changed code (1F1R +2A) with the expected value of the stored code value from the first encrypted message (step 865) (step 866). If the second device determines that the code (1F1R +2A) from the third cryptographic information is valid (step 866), the second device transmits a fourth cryptographic message in response to verifying the third cryptographic message, the fourth cryptographic message including a second fixed code and a second varying code (2F2R) (step 867).
The first device receives the fourth encrypted message (step 868) and verifies the fourth message by comparing the fixed code of the fourth message to the previously received fixed code (step 869). If the fixed codes are the same, indicating that both are from the second device, the fourth message is determined to be valid (step 870), and the first device stores the second fixed code and the second rolling code (2F2R) (step 871). The first device and the second device have now stored in their respective memories matching first fixed/rolling and second fixed/rolling code pairs (1F1R +2A and 2F2R) which are available as initial values (1F1R and 2F2R) in operation, such as shown in fig. 9A-9C.
The learning mode may operate at the same frequency as the operation mode, and may operate at multiple frequencies. In some embodiments, the first device and the second device communicate wirelessly via one or more frequencies, channels, frequency bands, and radio physical layers or protocols in the operational mode and/or the learning mode, including but not limited to, for example, 300MHz-400MHz, 900MHz, 2.4GHz, Wi-Fi/wlan, Bluetooth Low Energy (BLE), 3GPP GSM, UMTS, LTE-a, 5G NR, proprietary radio, and the like. In other embodiments, the first device and the second device communicate via a wired connection and various protocols in the operating mode and/or the learning mode, including but not limited to two (or more) wired serial communications, Universal Serial Bus (USB), inter-integrated circuit (I2C) protocol, ethernet, Control Area Network (CAN) vehicle bus, proprietary protocols, and the like. In some embodiments, the maximum distance between the first device and the second device may vary between the learning mode and the operating mode, while in other modes the maximum range in both modes will be the same due to the variation in the interference range.
While particular embodiments of the present invention have been shown and described, it will be appreciated by those skilled in the art that a number of modifications, alterations, and combinations of the above examples are possible without departing from the scope of the invention, and that such modifications, alterations, and combinations are to be viewed as being within the ambit of the inventive concept.

Claims (20)

1. A method of secure communication between a first device having a first memory and a second device having a second memory to cause an action of the second device, the method comprising:
transmitting a first encrypted message from the first apparatus to the second apparatus, the first encrypted message comprising at least a first fixed code and a first varying code;
the first device determining a first time window based on at least one of (i) at least a portion of the first encrypted message and (ii) at least a portion of the first change code, such that a response to the first encrypted message is expected in the first time window, the response being sent from the second device;
the second device receiving the first encrypted message;
the second device verifies the first encrypted message by comparing the first fixed code and the first varying code to a first stored code value stored in the second memory;
the second device determining a second time window based on the first encrypted message to transmit the response from the second device in the second time window;
transmitting the response from the second apparatus within the second time window in response to verifying the first encrypted message, wherein the response comprises a second encrypted message comprising a second fixed code and a second varying code;
the first device receiving the response from the second device within the first time window;
the first device verifies the response by comparing the second fixed code and the second varying code to a second stored code value stored in the first memory;
after verifying the response, the first device transmitting a third encrypted message comprising at least the changed versions of the first fixed code and the second changing code;
the second device receiving the third encrypted message;
the second device verifying the third encrypted message by comparing the changed versions of the first fixed code and the second changed code to a stored code value;
in response to verifying the third encrypted message, the second device performs an action.
2. The method of claim 1, wherein the first time window and the second time window are the same.
3. The method of claim 1, wherein the second time window is within the first time window.
4. The method of claim 1, further comprising enabling a receiver of the first apparatus to receive a transmission from the second apparatus within the first time window.
5. The method of claim 4, wherein enabling the receiver of the first apparatus comprises turning on the receiver.
6. The method of claim 4, wherein enabling the receiver comprises commanding the receiver to process an incoming transmission.
7. The method of claim 1, further comprising determining whether the response from the second apparatus was received within the first time window.
8. The method of claim 1, wherein the second time window is a discrete point in time.
9. The method of claim 1, wherein the first fixed code uniquely identifies the first device and the second fixed code uniquely identifies the second device.
10. The method of claim 1, wherein the second stored code value stored in the first memory comprises a previous fixed code and a previous varying code from a previous communication between the first apparatus and the second apparatus.
11. The method of claim 10, wherein comparing the second fixed code and the second varying code to the second stored code value comprises: determining whether the second fixed code matches the previous fixed code and whether the second varying code corresponds to the previous varying code.
12. The method of claim 1, wherein transmitting the first encrypted message from the first apparatus to the second apparatus comprises: wirelessly transmitting the first encrypted message using a radio frequency signal.
13. The method of claim 1, wherein the first device comprises a vehicle-mounted transmitter and the second device comprises a movable barrier operator.
14. A system for secure communication between a first device and a second device to cause an action by the second device, the system comprising:
the first device comprises:
a controller circuit;
a transmitter in operable communication with the controller circuit;
a receiver in operable communication with the controller circuit;
a user input device in operable communication with the controller circuit;
wherein the controller circuit is configured to:
in response to detecting an input at the user input device, controlling the transmitter to transmit a first encrypted message, the first encrypted message comprising at least a first fixed code and a first varying code;
receiving, by a receiver, a response from the second apparatus, wherein the response comprises a second encrypted message comprising a second fixed code and a second varying code;
validating the response by comparing the second fixed code and the second varying code to a second stored code value;
in response to verifying the response, controlling the transmitter to transmit a third encrypted message comprising at least the changed versions of the first fixed code and the second change code, wherein the third encrypted message is configured to cause the second apparatus to perform an action;
the second device includes:
a second controller circuit;
a second transmitter in operable communication with the second controller circuit;
a second receiver in operable communication with the second controller circuit;
a timer circuit in operable communication with the second controller circuit;
wherein the second controller circuit is configured to:
enabling a receiver of the second device to receive the first encrypted message;
verifying the first encrypted message by comparing the first fixed code and the first varying code to a stored code value;
determining a time window based on the first encrypted message to transmit the response in the time window;
controlling transmission of the response from the transmitter of the second apparatus within the time window by tracking the time window using the timer circuit in response to verifying the first encrypted message;
enabling the second receiver to receive the third encrypted message;
verifying the third encrypted message by comparing the changed versions of the first fixed code and the second changing code to a stored code value;
in response to verifying the third encrypted message, performing an action.
15. The system of claim 14, wherein the first device comprises a first device timer circuit in communication with the controller circuit, the controller circuit configured to determine a first time window based on at least a portion of the first encrypted message, the controller circuit configured to expect a response from the second device within the first time window.
16. The system of claim 15, wherein the controller circuit of the first device is configured to verify the response of the second device based at least in part on whether the response is received within the first time window.
17. The system of claim 14, wherein the first fixed code uniquely identifies the first device and the second fixed code uniquely identifies the second device.
18. The system of claim 14, wherein the second stored code value comprises a previous fixed code and a previous changed code from a previous communication between the first apparatus and the second apparatus.
19. The system of claim 18, wherein the controller circuit of the first device is configured to: comparing the second fixed code and the second varying code to the second stored code value by determining whether the second fixed code matches the previous fixed code and whether the second varying code corresponds to the previous varying code.
20. The system of claim 14, wherein the controller circuit is configured to: control the transmitter to wirelessly transmit the first encrypted message using a radio frequency signal.
CN201880083263.XA 2017-12-21 2018-12-20 Safety system for movable barrier operator Active CN111837165B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410216482.8A CN118135696A (en) 2017-12-21 2018-12-20 Safety system for movable barrier operator

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
US201762608977P 2017-12-21 2017-12-21
US62/608,977 2017-12-21
PCT/US2018/066722 WO2019126453A1 (en) 2017-12-21 2018-12-20 Security system for a moveable barrier operator

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202410216482.8A Division CN118135696A (en) 2017-12-21 2018-12-20 Safety system for movable barrier operator

Publications (2)

Publication Number Publication Date
CN111837165A true CN111837165A (en) 2020-10-27
CN111837165B CN111837165B (en) 2024-03-19

Family

ID=65019615

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201880083263.XA Active CN111837165B (en) 2017-12-21 2018-12-20 Safety system for movable barrier operator
CN202410216482.8A Pending CN118135696A (en) 2017-12-21 2018-12-20 Safety system for movable barrier operator

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN202410216482.8A Pending CN118135696A (en) 2017-12-21 2018-12-20 Safety system for movable barrier operator

Country Status (7)

Country Link
US (4) US10652743B2 (en)
EP (1) EP3729386A1 (en)
KR (3) KR20240042188A (en)
CN (2) CN111837165B (en)
AU (2) AU2018388665B2 (en)
CA (2) CA3085470A1 (en)
WO (1) WO2019126453A1 (en)

Families Citing this family (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9970228B2 (en) * 2013-10-04 2018-05-15 The Chamberlain Group, Inc. Movable barrier safety sensor override
US10652743B2 (en) 2017-12-21 2020-05-12 The Chamberlain Group, Inc. Security system for a moveable barrier operator
US11074773B1 (en) 2018-06-27 2021-07-27 The Chamberlain Group, Inc. Network-based control of movable barrier operators for autonomous vehicles
WO2020028502A1 (en) 2018-08-01 2020-02-06 The Chamberlain Group, Inc. Movable barrier operator and transmitter pairing over a network
US11028633B2 (en) 2018-12-06 2021-06-08 The Chamberlain Group, Inc. Automatic control of a movable barrier
US11402812B1 (en) 2019-03-22 2022-08-02 The Chamberlain Group Llc Apparatus and method for controlling a device
US11220856B2 (en) 2019-04-03 2022-01-11 The Chamberlain Group Llc Movable barrier operator enhancement device and method
CN114128336B (en) * 2019-05-13 2024-04-26 拉姆达4发展有限公司 Radio authorization system, method, usage method and access restriction system
US10997810B2 (en) 2019-05-16 2021-05-04 The Chamberlain Group, Inc. In-vehicle transmitter training
US11578527B2 (en) 2019-07-08 2023-02-14 The Chamberlain Group Llc In-vehicle device for controlling a movable barrier operator
US11562056B2 (en) 2020-02-05 2023-01-24 Quantum Digital Solutions Corporation Systems for establishing a digital ecosystem using digital genomic data sets
CA3203023A1 (en) * 2020-12-30 2022-07-07 The Chamberlain Group Llc Security system for a moveable barrier operator
AU2022216269A1 (en) 2021-02-04 2023-08-10 Quantum Digital Solutions Corporation Cyphergenics-based ecosystem security platforms
WO2022251558A1 (en) * 2021-05-27 2022-12-01 The Chamberlain Group Llc Security system for a moveable barrier operator
KR20240014495A (en) * 2021-05-28 2024-02-01 더 체임벌린 그룹 엘엘씨 Security system for mobile barrier actuators
EP4348606A2 (en) * 2021-05-28 2024-04-10 The Chamberlain Group LLC Security system for a moveable barrier operator
AU2022290572A1 (en) * 2021-06-11 2024-01-25 The Chamberlain Group Llc Method and system for a changing code learning transmitter
WO2024026501A1 (en) 2022-07-28 2024-02-01 The Chamberlain Group Llc System and method for programming a trainable transmitter

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4779090A (en) * 1986-08-06 1988-10-18 Micznik Isaiah B Electronic security system with two-way communication between lock and key
CA2443452A1 (en) * 1995-05-17 1996-11-21 The Chamberlain Group, Inc. Rolling code security system
EP0870889A2 (en) * 1997-04-07 1998-10-14 Eaton Corporation Keyless motor vehicle entry and ignition system
US6154544A (en) * 1995-05-17 2000-11-28 The Chamberlain Group, Inc. Rolling code security system
US20030033540A1 (en) * 2001-08-09 2003-02-13 The Chamberlain Group, Inc. Method and apparatus for a rolling code learning transmitter
US20040066936A1 (en) * 1995-05-17 2004-04-08 The Chamberlain Group, Ltd. Rolling code security system
CN101160557A (en) * 2005-04-19 2008-04-09 约翰逊控制技术公司 System and method for training a trainable transmitter and a remote control system receiver
CN101221692A (en) * 2007-01-12 2008-07-16 李尔公司 Voice programmable and voice activated vehicle-based appliance remote control
CN101248462A (en) * 2005-08-24 2008-08-20 韦恩达尔顿公司 System and methods for automatically moving access barriers initiated by mobile transmitter devices
CN101390138A (en) * 2006-01-03 2009-03-18 约翰逊控制技术公司 Transmitter and method for transmitting an RF control signal
WO2011106199A1 (en) * 2010-02-25 2011-09-01 The Chamberlain Group, Inc. Method and apparatus for training a learning movable barrier operator transceiver
CN104464057A (en) * 2014-12-17 2015-03-25 江苏合智同创电子科技有限公司 Hopping encoding method for car entrance guard system
CN107466463A (en) * 2014-10-13 2017-12-12 自动化科技(澳大利亚)有限公司 Remote supervisory and controlling syste for barrier operating device

Family Cites Families (609)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US29525A (en) 1860-08-07 Metallic alloy for journal bearings and boxes
US30957A (en) 1860-12-18 Improved steam-boiler
US35364A (en) 1862-05-27 Improved defensive arm or-plate
US803047A (en) 1905-06-28 1905-10-31 William Jerome Browne Disk drill.
US1065274A (en) 1910-11-05 1913-06-17 Rich Tool Co Chuck.
GB218774A (en) 1923-04-24 1924-07-17 Paul Arbon Improvements in underreamers
CH227464A (en) 1942-01-29 1943-06-15 Patelhold Patentverwertung Method for the transmission of messages which are disguised with the aid of control signals.
US2963270A (en) 1956-09-17 1960-12-06 Preco Inc Turbine mechanism, more particularly for air flow operation for vacuum cleaning
US4304962A (en) 1965-08-25 1981-12-08 Bell Telephone Laboratories, Incorporated Data scrambler
GB1156279A (en) 1967-12-20 1969-06-25 Standard Telephones Cables Ltd Data Transmission Terminal
US3716865A (en) 1971-06-10 1973-02-13 Chamberlain Mfg Corp Radio controlled system for garage door opener
US3798360A (en) 1971-06-30 1974-03-19 Ibm Step code ciphering system
US3798605A (en) 1971-06-30 1974-03-19 Ibm Centralized verification system
US3798359A (en) 1971-06-30 1974-03-19 Ibm Block cipher cryptographic system
GB1360260A (en) 1971-09-23 1974-07-17 Standard Telephones Cables Ltd Multilevel pcm system
US3735106A (en) 1971-12-30 1973-05-22 Ibm Programmable code selection for automatic address answerback in a terminal system
US3938091A (en) 1972-03-17 1976-02-10 Atalla Technovations Company Personal verification system
US3845277A (en) 1972-09-01 1974-10-29 Mosler Safe Co Off-line cash dispenser and banking system
US3792446A (en) 1972-12-04 1974-02-12 Pitney Bowes Inc Remote postage meter resetting method
US3906348A (en) 1973-08-20 1975-09-16 Chamberlain Mfg Corp Digital radio control
USRE30957E (en) 1973-10-15 1982-06-01 International Business Machines Corporation Variant key matrix cipher system
US4195196A (en) 1973-10-15 1980-03-25 International Business Machines Corporation Variant key matrix cipher system
US3890601A (en) 1974-03-11 1975-06-17 Philco Ford Corp Password operated system for preventing unauthorized or accidental computer memory alteration
US4037201A (en) 1975-11-24 1977-07-19 Chamberlain Manufacturing Corporation Digital radio control
US4196310A (en) 1976-04-09 1980-04-01 Digital Data, Inc. Secure SCA broadcasting system including subscriber actuated portable receiving terminals
US4064404A (en) 1976-04-19 1977-12-20 Chamberlain Manufacturing Corporation Accessory for a garage door opener
US4078152A (en) 1976-04-26 1978-03-07 International Business Machines Corporation Block-cipher cryptographic system with chaining
US4195200A (en) 1976-06-30 1980-03-25 International Business Machines Corporation Key controlled block-cipher cryptographic system employing a multidirectional shift matrix
US4097859A (en) 1976-11-01 1978-06-27 Burroughs Corporation Three-level to two-level decoder
US4316055A (en) 1976-12-30 1982-02-16 International Business Machines Corporation Stream/block cipher crytographic system
US4138735A (en) 1977-01-31 1979-02-06 Pitney-Bowes, Inc. System for remotely resetting postage rate memories
US4178549A (en) 1978-03-27 1979-12-11 National Semiconductor Corporation Recognition of a received signal as being from a particular transmitter
GB2099195B (en) 1978-05-03 1983-05-18 Atalla Technovations Method and apparatus for securing data transmissions
US4218738A (en) 1978-05-05 1980-08-19 International Business Machines Corporation Method for authenticating the identity of a user of an information system
GB2023899B (en) 1978-06-14 1982-10-27 Hitachi Ltd Remote-controlled automatic control apparatus
US4328540A (en) 1979-02-23 1982-05-04 Hitachi, Ltd. Door operation control apparatus
US4426637A (en) 1979-02-26 1984-01-17 Multi-Elmac Company Combination encoder-decoder integrated circuit device
US4305060A (en) 1979-02-26 1981-12-08 Multi-Elmac Company Decoder circuitry for selectively activating loads
US4243976A (en) 1979-03-12 1981-01-06 The Singer Company Ternary to binary converter
US4471593A (en) 1979-03-15 1984-09-18 Douglas Ragland Fastening clip for panel
GB2051442B (en) 1979-03-30 1984-02-01 Howard J A Security system
US4327444A (en) 1979-06-04 1982-04-27 Tmx Systems Limited Miniature transmitter and method for making same
US4255742A (en) 1979-06-07 1981-03-10 Ford Motor Company Data communication code
US4387460A (en) 1979-07-23 1983-06-07 Societe Anonyme De Tele-Communication Supplementary information transmitting arrangement for a digital data transmission system
US4328414A (en) 1979-12-11 1982-05-04 Atalla Technovations Multilevel security apparatus and method
US4445712A (en) 1980-01-14 1984-05-01 Id Code Industries, Inc. Identification devices and methods
US4380762A (en) 1980-01-31 1983-04-19 Gaetano Capasso Polyfunction programmable data receiver
US4454509A (en) 1980-02-27 1984-06-12 Regency Electronics, Inc. Apparatus for addressably controlling remote units
US4464651A (en) 1980-04-14 1984-08-07 Stanley Vemco Home security and garage door operator system
US4385231A (en) 1980-06-27 1983-05-24 Omron Tateisi Electronics Co. Unlocking system for use with cards
US4326098A (en) 1980-07-02 1982-04-20 International Business Machines Corporation High security system for electronic signature verification
US4447890A (en) 1980-07-14 1984-05-08 Pitney Bowes Inc. Remote postage meter systems having variable user authorization code
US4393269A (en) 1981-01-29 1983-07-12 International Business Machines Corporation Method and apparatus incorporating a one-way sequence for transaction and identity verification
US4418333A (en) 1981-06-08 1983-11-29 Pittway Corporation Appliance control system
IL63117A (en) 1981-06-18 1984-05-31 Schwartz Nira Apparatus and method for transmission of communications
US4578530A (en) 1981-06-26 1986-03-25 Visa U.S.A., Inc. End-to-end encryption system and method of operation
US4468787A (en) 1981-11-09 1984-08-28 Lear Siegler, Inc. Ternary data transmission system
US4580111A (en) 1981-12-24 1986-04-01 Harris Corporation Amplitude modulation using digitally selected carrier amplifiers
US4602357A (en) 1982-02-12 1986-07-22 Ensco Inc. Coded acoustic alarm transmitter/receiver system
GB2118614A (en) 1982-04-16 1983-11-02 Leonard Joseph Genest Method of code changing for electronic lock
DE3225754A1 (en) 1982-07-09 1984-01-12 Hülsbeck & Fürst GmbH & Co KG, 5620 Velbert METHOD FOR THE LOCKING EFFECTIVE INTERACTION OF A KEY-LIKE PART WITH A LOCK-LIKE PART
US4581606A (en) 1982-08-30 1986-04-08 Isotec Industries Limited Central monitor for home security system
DE3234539A1 (en) 1982-09-17 1984-03-22 Siemens AG, 1000 Berlin und 8000 München METHOD FOR SECURING THE CODE OF AN ELECTRONIC KEY
DE3234538A1 (en) 1982-09-17 1984-03-22 Siemens AG, 1000 Berlin und 8000 München METHOD FOR SECURING THE CODE OF AN ELECTRONIC KEY
US4535333A (en) 1982-09-23 1985-08-13 Chamberlain Manufacturing Corporation Transmitter and receiver for controlling remote elements
US4529980A (en) 1982-09-23 1985-07-16 Chamberlain Manufacturing Corporation Transmitter and receiver for controlling the coding in a transmitter and receiver
DE3237622A1 (en) 1982-10-11 1984-04-12 Bayerische Motoren Werke AG, 8000 München SECURITY DEVICE
DE3244049C2 (en) 1982-11-27 1986-06-26 Kiekert GmbH & Co KG, 5628 Heiligenhaus Central locking system for a motor vehicle
US4471493A (en) 1982-12-16 1984-09-11 Gte Automatic Electric Inc. Wireless telephone extension unit with self-contained dipole antenna
DE3300732A1 (en) 1983-01-12 1984-09-20 Kiekert GmbH & Co KG, 5628 Heiligenhaus CENTRAL LOCKING SYSTEM FOR A MOTOR VEHICLE
DE3309802C2 (en) 1983-03-18 1985-07-04 Audi AG, 8070 Ingolstadt Electronic system for motor vehicles
DE3320721A1 (en) 1983-06-08 1984-12-13 Siemens AG, 1000 Berlin und 8000 München METHOD FOR SECURING THE CODE OF AN ELECTRONIC KEY
US4590470A (en) 1983-07-11 1986-05-20 At&T Bell Laboratories User authentication system employing encryption functions
GB8320706D0 (en) 1983-08-01 1983-09-01 Waitrose Ltd Locking devices
US4628315A (en) 1983-08-16 1986-12-09 Sparton Corporation Addressable transducer with improved address signal processing
DE3332721A1 (en) 1983-09-10 1985-03-28 "Wreges" Elektronic- und Mechanik-GmbH, 4992 Espelkamp Blocking device for automatic vending machines
JPS6065875A (en) 1983-09-19 1985-04-15 日産自動車株式会社 Locking controller for vehicle
US4931789A (en) 1983-11-01 1990-06-05 Universal Photonix, Inc. Apparatus and method for a universal electronic locking system
US4593155A (en) 1983-12-05 1986-06-03 Motorola, Inc. Portable telephone ID code transfer system
US4491774A (en) 1983-12-30 1985-01-01 Motorola, Inc. Control system for a radio-controlled door operator
US4686529A (en) 1984-01-06 1987-08-11 Kiekert Gmbh & Co. Kommanditgesellschaft Remote-control lock system
US4599489A (en) 1984-02-22 1986-07-08 Gordian Systems, Inc. Solid state key for controlling access to computer software
DE3407469A1 (en) 1984-02-29 1985-09-05 Siemens AG, 1000 Berlin und 8000 München METHOD FOR SECURING THE CODE OF AN ELECTRONIC KEY
DE3407436A1 (en) 1984-02-29 1985-08-29 Siemens AG, 1000 Berlin und 8000 München METHOD FOR SECURING THE CODE OF AN ELECTRONIC KEY
DE3407389A1 (en) 1984-02-29 1985-08-29 Blaupunkt-Werke Gmbh, 3200 Hildesheim CONTROL DEVICE FOR RELEASING CONTROL PROCESSES
US4754255A (en) 1984-03-12 1988-06-28 Sanders Rudy T User identifying vehicle control and security device
US4596898A (en) 1984-03-14 1986-06-24 Computer Security Systems, Inc. Method and apparatus for protecting stored and transmitted data from compromise or interception
US4653076A (en) 1984-03-23 1987-03-24 Sangamo Weston, Inc. Timing signal correction system for use in direct sequence spread signal receiver
US4928098A (en) 1984-03-30 1990-05-22 Siemens Aktiengesellschaft Method for code protection using an electronic key
US4626848A (en) 1984-05-15 1986-12-02 General Electric Company Programmable functions for reconfigurable remote control
US4623887A (en) 1984-05-15 1986-11-18 General Electric Company Reconfigurable remote control
US4646080A (en) 1984-05-17 1987-02-24 Leonard J. Genest Method of code changing for electronic lock
US4574247A (en) 1984-05-21 1986-03-04 Multi-Elmac Company FM Signal demodulator
US4750118A (en) 1985-10-29 1988-06-07 Chamberlain Manufacturing Corporation Coding system for multiple transmitters and a single receiver for a garage door opener
USRE35364E (en) 1985-10-29 1996-10-29 The Chamberlain Group, Inc. Coding system for multiple transmitters and a single receiver for a garage door opener
US4638433A (en) 1984-05-30 1987-01-20 Chamberlain Manufacturing Corporation Microprocessor controlled garage door operator
FR2565752B1 (en) 1984-06-08 1986-09-05 Radiotechnique Compelec SLAVE-TYPE INTERFACE CIRCUIT OPERATING WITH A SERIAL BUS
US4566044A (en) 1984-10-29 1986-01-21 International Business Machines Corporation Direction-constrained ternary codes using peak and polarity detection
US4885778A (en) 1984-11-30 1989-12-05 Weiss Kenneth P Method and apparatus for synchronizing generation of separate, free running, time dependent equipment
US4856062A (en) 1984-11-30 1989-08-08 Kenneth Weiss Computing and indicating device
US5367572A (en) 1984-11-30 1994-11-22 Weiss Kenneth P Method and apparatus for personal identification
US4720860A (en) 1984-11-30 1988-01-19 Security Dynamics Technologies, Inc. Method and apparatus for positively identifying an individual
US5168520A (en) 1984-11-30 1992-12-01 Security Dynamics Technologies, Inc. Method and apparatus for personal identification
US4998279A (en) 1984-11-30 1991-03-05 Weiss Kenneth P Method and apparatus for personal verification utilizing nonpredictable codes and biocharacteristics
JPS61139873A (en) 1984-12-13 1986-06-27 Casio Comput Co Ltd Authorization system
US4630035A (en) 1985-01-04 1986-12-16 Motorola, Inc. Alarm system having alarm transmitter indentification codes and acoustic ranging
US4800590A (en) 1985-01-14 1989-01-24 Willis E. Higgins Computer key and computer lock system
US4703359A (en) 1985-05-30 1987-10-27 Nap Consumer Electronics Corp. Universal remote control unit with model identification capability
US4794622A (en) 1985-06-03 1988-12-27 Linear Corporation Low power transmitter frequency stabilization
US4755792A (en) 1985-06-13 1988-07-05 Black & Decker Inc. Security control system
DE3529882A1 (en) 1985-08-21 1987-02-26 Vdo Schindling SYSTEM FOR LOCKING AND / OR UNLOCKING A SECURITY DEVICE
US4677284A (en) 1985-08-22 1987-06-30 Genest Leonard Joseph Multi-access security system
EP0215291B1 (en) 1985-09-10 1991-02-27 Hülsbeck & Fürst GmbH. & Co. KG Electronic locking device for motor vehicles
DE3532156A1 (en) 1985-09-10 1987-03-26 Huelsbeck & Fuerst Electronic locking device for motor vehicles
US4611198A (en) 1985-09-19 1986-09-09 Levinson Samuel H Security and communication system
US4799061A (en) 1985-11-18 1989-01-17 International Business Machines Corporation Secure component authentication system
GB2183971B (en) 1985-12-05 1989-10-04 Stc Plc Data transmission system
JPH0728448B2 (en) 1986-02-07 1995-03-29 アールシーエー トムソン ライセンシング コーポレイシヨン Reconfigurable remote control transmitter
US4737770A (en) 1986-03-10 1988-04-12 Interactive Technologies, Inc. Security system with programmable sensor and user data input transmitters
US4716301A (en) 1986-04-08 1987-12-29 Chamberlain Manufacturing Corporation Digital light control
US4831509A (en) 1986-04-16 1989-05-16 Byrne & Davidson Doors (N.S.W.)Pty. Limited Door operation control apparatus
FR2597538B1 (en) 1986-04-22 1995-03-31 Soum Rene SECURITY LOCK ASSEMBLY WITH REMOTE CONTROL IN WHICH THE KEY HAS ONLY A TRANSMISSION FUNCTION AND THE RECEPTION LOCK
US4829296A (en) 1986-04-30 1989-05-09 Carey S. Clark Electronic lock system
FR2598258B1 (en) 1986-04-30 1988-10-07 Aix Les Bains Composants METHOD OF ENCAPSULATING INTEGRATED CIRCUITS.
US4808995A (en) 1986-05-02 1989-02-28 Stanley Automatic Openers Accessory-expandable, radio-controlled, door operator with multiple security levels
FR2600189B1 (en) 1986-06-16 1991-02-01 Bull Cp8 PROCESS FOR AUTHENTICATING BY AN EXTERNAL ENVIRONMENT A PORTABLE OBJECT SUCH AS A MEMORY CARD COUPLED TO THIS ENVIRONMENT
JPH0625503B2 (en) 1986-06-20 1994-04-06 日産自動車株式会社 Unlock control device
ES2026498T3 (en) 1986-08-12 1992-05-01 Siemens Aktiengesellschaft ELECTRONIC LOCKING INSTALLATION WITH AT LEAST ONE LOCK ESPECIALLY FOR AUTOMOBILES.
US4740792A (en) 1986-08-27 1988-04-26 Hughes Aircraft Company Vehicle location system
JPH0747910B2 (en) 1986-10-24 1995-05-24 日産自動車株式会社 Remote control device
US4796181A (en) 1986-10-24 1989-01-03 Wiedemer John D Billing system for computer software
JPH0710091B2 (en) 1986-10-24 1995-02-01 ソニー株式会社 Electronics
US4804938A (en) 1986-10-24 1989-02-14 Sangamo Weston, Inc. Distribution energy management system
DE3636822C2 (en) 1986-10-29 1993-12-23 Ruf Kg Wilhelm Electronic remote control device, in particular for central locking systems of motor vehicles
FR2606235B1 (en) 1986-10-30 1988-12-02 Neiman Sa INFRARED TRANSMITTER CODE TO FIXED CODE AND LARGE NUMBER OF COMBINATIONS
FR2606232B1 (en) 1986-10-31 1988-12-02 Neiman Sa HIGH SECURITY SCALABLE CODING METHOD AND DEVICE FOR CARRYING OUT SAID METHOD
FR2607544A1 (en) 1986-11-27 1988-06-03 Neiman Sa Electronic lock with periodic code change
US4731575A (en) 1986-12-08 1988-03-15 Sloan Joseph W Prepayment metering system using encoded purchase cards
FR2609086B1 (en) 1986-12-31 1992-12-11 Peugeot MODIFIABLE THEFT PROTECTION CODE DEVICE FOR MOTOR VEHICLES
US4761808A (en) 1987-03-18 1988-08-02 Sheldon Howard Time code telephone security access system
US4859990A (en) 1987-04-15 1989-08-22 Linear Corporation Electrically programmable transceiver security system and integrated circuit
US4845491A (en) 1987-05-15 1989-07-04 Newspager Corporation Of America Pager based information system
US4881148A (en) 1987-05-21 1989-11-14 Wickes Manufacturing Company Remote control system for door locks
US4825200A (en) 1987-06-25 1989-04-25 Tandy Corporation Reconfigurable remote control transmitter
US4988990A (en) 1989-05-09 1991-01-29 Rosemount Inc. Dual master implied token communication system
JP2767816B2 (en) 1987-10-07 1998-06-18 セイコーエプソン株式会社 Remote control transmitter / receiver
US4918690A (en) 1987-11-10 1990-04-17 Echelon Systems Corp. Network and intelligent cell for providing sensing, bidirectional communications and control
US4939792A (en) 1987-11-16 1990-07-03 Motorola, Inc. Moldable/foldable radio housing
DE3741324A1 (en) 1987-12-05 1989-06-15 Alltronik Gmbh REMOTE TRANSMITTER FOR TRANSMITTING CODED ELECTROMAGNETIC IMPULSES AND RECEIVER ADJUSTED THEREFOR
US4856081A (en) 1987-12-09 1989-08-08 North American Philips Consumer Electronics Corp. Reconfigurable remote control apparatus and method of using the same
EP0321727B1 (en) 1987-12-17 1992-03-18 Siemens Aktiengesellschaft Method and circuit to protect eeprom memories against devaluation manipulation
US4893338A (en) 1987-12-31 1990-01-09 Pitney Bowes Inc. System for conveying information for the reliable authentification of a plurality of documents
US4870400A (en) 1988-01-26 1989-09-26 Yale Security Inc. Electronic door lock key re-sequencing function
US4951029A (en) 1988-02-16 1990-08-21 Interactive Technologies, Inc. Micro-programmable security system
JPH01218296A (en) 1988-02-26 1989-08-31 Nec Home Electron Ltd Remote control receiver with study function
US5060263A (en) 1988-03-09 1991-10-22 Enigma Logic, Inc. Computer access control system and method
US4992783A (en) 1988-04-04 1991-02-12 Motorola, Inc. Method and apparatus for controlling access to a communication system
US4980913A (en) 1988-04-19 1990-12-25 Vindicator Corporation Security system network
US5412379A (en) 1988-05-27 1995-05-02 Lectron Products, Inc. Rolling code for a keyless entry system
US4942393A (en) 1988-05-27 1990-07-17 Lectron Products, Inc. Passive keyless entry system
JP2687454B2 (en) 1988-06-28 1997-12-08 ソニー株式会社 General commander
US5021776A (en) 1988-07-11 1991-06-04 Yale Security Inc. Electronic combination of lock with changeable entry codes, lock-out and programming code
US4912463A (en) 1988-08-09 1990-03-27 Princeton Technology Corporation Remote control apparatus
US4914696A (en) 1988-08-15 1990-04-03 Motorola, Inc. Communications system with tandem scrambling devices
JPH0732499B2 (en) 1988-08-16 1995-04-10 日産自動車株式会社 Lock and unlock control system
US4890108A (en) 1988-09-09 1989-12-26 Clifford Electronics, Inc. Multi-channel remote control transmitter
US4855713A (en) 1988-10-07 1989-08-08 Interactive Technologies, Inc. Learn mode transmitter
US5049867A (en) 1988-11-30 1991-09-17 Code-Alarm, Inc. Vehicle security apparatus
US5442340A (en) 1988-12-05 1995-08-15 Prince Corporation Trainable RF transmitter including attenuation control
US5479155A (en) 1988-12-05 1995-12-26 Prince Corporation Vehicle accessory trainable transmitter
IT1227401B (en) 1988-12-06 1991-04-08 Delta Elettronica Spa DEVICES FOR REMOTE TRANSMISSION OF SAFE CONTROLS
DE3905651A1 (en) 1989-02-24 1990-08-30 Daimler Benz Ag METHOD FOR SECURING CODE WORDS OF A REMOTE CONTROL SYSTEM AND REMOTE CONTROL SYSTEM WITH CODE TRANSFERABLE BY CODE WORDS
US5148159A (en) 1989-04-26 1992-09-15 Stanley Electronics Remote control system with teach/learn setting of identification code
US4922168A (en) 1989-05-01 1990-05-01 Genie Manufacturing, Inc. Universal door safety system
DE59004565D1 (en) 1989-05-18 1994-03-24 Siemens Ag TRANSMITTER RECEIVER SYSTEM.
US5528621A (en) 1989-06-29 1996-06-18 Symbol Technologies, Inc. Packet data communication system
US4988992A (en) 1989-07-27 1991-01-29 The Chamberlain Group, Inc. System for establishing a code and controlling operation of equipment
US5331325A (en) 1989-08-14 1994-07-19 Crimestopper Security Products Inc. Remote control transmitter configured as an article of utility
US4963876A (en) 1989-08-21 1990-10-16 Sanders Rudy T Thin programmable remote control transmitter
US4979832A (en) 1989-11-01 1990-12-25 Ritter Terry F Dynamic substitution combiner and extractor
US5126959A (en) 1989-11-20 1992-06-30 Clarion Co., Ltd. Code generation control device
US5146067A (en) 1990-01-12 1992-09-08 Cic Systems, Inc. Prepayment metering system using encoded purchase cards from multiple locations
FR2660131B1 (en) 1990-03-23 1992-06-19 France Etat DEVICE FOR TRANSMITTING DIGITAL DATA WITH AT LEAST TWO LEVELS OF PROTECTION, AND CORRESPONDING RECEPTION DEVICE.
JP2679346B2 (en) 1990-03-28 1997-11-19 神鋼電機株式会社 Charging control method for mobile robot system
US5300922A (en) 1990-05-29 1994-04-05 Sensormatic Electronics Corporation Swept frequency electronic article surveillance system having enhanced facility for tag signal detection
US6175312B1 (en) 1990-05-29 2001-01-16 Microchip Technology Incorporated Encoder and decoder microchips and remote control devices for secure unidirectional communication
ATE136975T1 (en) 1990-05-29 1996-05-15 Microchip Tech Inc INTEGRATED CIRCUITS, PARTICULARLY FOR USE IN REMOTE CONTROL SYSTEMS
US5150464A (en) 1990-06-06 1992-09-22 Apple Computer, Inc. Local area network device startup process
DE4018261C1 (en) 1990-06-07 1991-08-14 Mercedes-Benz Aktiengesellschaft, 7000 Stuttgart, De
US5576701A (en) 1990-07-16 1996-11-19 The Chamberlain Group, Inc. Remote actuating apparatus comprising keypad controlled transmitter
WO1992001979A1 (en) 1990-07-16 1992-02-06 The Chamberlain Group, Inc. Remote actuating apparatus
US5091942A (en) 1990-07-23 1992-02-25 Ericsson Ge Mobile Communications Holding, Inc. Authentication system for digital cellular communications
US5224163A (en) 1990-09-28 1993-06-29 Digital Equipment Corporation Method for delegating authorization from one entity to another through the use of session encryption keys
US5144667A (en) 1990-12-20 1992-09-01 Delco Electronics Corporation Method of secure remote access
DE4204463C2 (en) 1991-02-15 1995-06-01 Alps Electric Co Ltd Identification information transceiver
US6166650A (en) 1991-05-29 2000-12-26 Microchip Technology, Inc. Secure self learning system
US5686904A (en) 1991-05-29 1997-11-11 Microchip Technology Incorporated Secure self learning system
US5485519A (en) 1991-06-07 1996-01-16 Security Dynamics Technologies, Inc. Enhanced security for a secure token code
US5657388A (en) 1993-05-25 1997-08-12 Security Dynamics Technologies, Inc. Method and apparatus for utilizing a token for resource access
US5479512A (en) 1991-06-07 1995-12-26 Security Dynamics Technologies, Inc. Method and apparatus for performing concryption
US5237614A (en) 1991-06-07 1993-08-17 Security Dynamics Technologies, Inc. Integrated network security system
US5116058A (en) 1991-06-27 1992-05-26 Theriault Joseph H Golf swing training device
FI88909C (en) 1991-07-03 1993-07-26 Risto Nikander Method and apparatus for bending and / or tempering glass
US5193210A (en) 1991-07-29 1993-03-09 Abc Auto Alarms, Inc. Low power RF receiver
US5252960A (en) 1991-08-26 1993-10-12 Stanley Home Automation Secure keyless entry system for automatic garage door operator
FR2685520B1 (en) 1991-12-23 1998-06-12 Monetel RECHARGEABLE MEMORY CARD, SECURING METHOD AND TERMINAL OF USE.
US5778348A (en) 1991-12-24 1998-07-07 Pitney Bowes Inc. Remote activation of rating capabilities in a computerized parcel manifest system
US5473318A (en) 1992-01-10 1995-12-05 Active Control Technology Inc. Secure remote control system with receiver controlled to add and delete identity codes
GB2265482B (en) 1992-03-28 1995-07-26 Pektron Ltd Improvements in data transmission
US5745571A (en) 1992-03-30 1998-04-28 Telstra Corporation Limited Cryptographic communications method and system
US5442341A (en) 1992-04-10 1995-08-15 Trw Inc. Remote control security system
US5280527A (en) 1992-04-14 1994-01-18 Kamahira Safe Co., Inc. Biometric token for authorizing access to a host system
US5872519A (en) 1992-05-22 1999-02-16 Directed Electronics, Inc. Advanced embedded code hopping system
GB9212110D0 (en) 1992-06-06 1992-07-22 Corrigan Nigel M Ground radio transmitting and receiving apparatus
CA2137674A1 (en) 1992-06-30 1994-01-06 Tracey L. Mynott Use of enzymes, especially bromelain, in the treatment of diarrhoea
JP2977426B2 (en) 1992-11-04 1999-11-15 アルプス電気株式会社 Signal generation method for transmitting / receiving device
FR2698195B1 (en) 1992-11-19 1994-12-16 Gemplus Card Int Encryption and authentication method and circuit for synchronous memory card.
US5361062A (en) 1992-11-25 1994-11-01 Security Dynamics Technologies, Inc. Personal security system
DE69327644T2 (en) 1993-01-07 2000-09-07 Ford France S.A., Rueil-Malmaison Remote controlled security system
WO1994018036A1 (en) 1993-02-12 1994-08-18 Robert Bosch Gmbh Remote-controlled protection system for a motor vehicle
US5278907A (en) 1993-03-01 1994-01-11 Transcrypt International, Inc. Analog scrambling with continuous synchronization
JPH077771A (en) 1993-03-19 1995-01-10 Sony Corp Remote commander
US5414418A (en) 1993-05-03 1995-05-09 Motorola, Inc. Method and apparatus for pre-programming and subsequently designating a response characteristic of a selective call receiver
US5444737A (en) 1993-05-05 1995-08-22 National Semiconductor Corporation Wireless data transceiver
US5363448A (en) 1993-06-30 1994-11-08 United Technologies Automotive, Inc. Pseudorandom number generation and cryptographic authentication
JPH0781521A (en) 1993-06-30 1995-03-28 Alpine Electron Inc Security device
CA2105426C (en) 1993-09-02 1999-04-20 Normand Dery Remote vehicle starting system
US5594429A (en) 1993-10-27 1997-01-14 Alps Electric Co., Ltd. Transmission and reception system and signal generation method for same
US5680131A (en) 1993-10-29 1997-10-21 National Semiconductor Corporation Security system having randomized synchronization code after power up
US6094575A (en) 1993-11-01 2000-07-25 Omnipoint Corporation Communication system and method
US5369706A (en) 1993-11-05 1994-11-29 United Technologies Automotive, Inc. Resynchronizing transmitters to receivers for secure vehicle entry using cryptography or rolling code
US5578999A (en) 1993-12-06 1996-11-26 Casio Computer Co., Ltd. Remote control with learning function and confirmation thereof
JP3354685B2 (en) 1994-02-07 2002-12-09 富士通株式会社 Code division multiplex communication equipment
US5420925A (en) 1994-03-03 1995-05-30 Lectron Products, Inc. Rolling code encryption process for remote keyless entry system
GB9406754D0 (en) 1994-04-06 1994-05-25 Doxas Michael Remote control radio key with ultimate protectin against decoding and accessing of codes by any method including scanners, grabbers and radio receivers
DE4418069C1 (en) * 1994-05-24 1995-08-24 Daimler Benz Ag Security device with electronically encoded access authorisation
US5471668A (en) 1994-06-15 1995-11-28 Texas Instruments Incorporated Combined transmitter/receiver integrated circuit with learn mode
JP3319230B2 (en) 1994-08-05 2002-08-26 株式会社デンソー Remote control device
US5600653A (en) 1994-09-30 1997-02-04 Comsat Corporation Technique for improving asynchronous transfer mode operation over a communications link with bursty bit errors
US5678213A (en) 1994-09-30 1997-10-14 Lucent Technologies Inc. Radio receiver for processing a multi-carrier signal with a large dynamic range
US5719619A (en) 1994-10-08 1998-02-17 Sony Corporation Bidirectional broadcasting method, bidirectional broadcasting system and receiver apparatus for bidirectional broadcast
FI97581C (en) 1995-02-10 1997-01-10 Nokia Telecommunications Oy Receiver and method for generating spreading codes at the receiver
US5598475A (en) 1995-03-23 1997-01-28 Texas Instruments Incorporated Rolling code identification scheme for remote control applications
US5565812A (en) 1995-03-23 1996-10-15 Texas Instruments Incorporated Increased sensitivity signal shaper circuit to recover a data stream coming from a digitally modulated channel
US6157719A (en) 1995-04-03 2000-12-05 Scientific-Atlanta, Inc. Conditional access system
US7737820B2 (en) 1995-04-14 2010-06-15 Omega Patents, L.L.C. Remote control system for an access door having remote transmitter verification
US6140938A (en) 1995-04-14 2000-10-31 Flick; Kenneth E. Remote control system suitable for a vehicle and having remote transmitter verification
US5608723A (en) 1995-04-26 1997-03-04 Interval Research Corporation Methods and systems for secure wireless communication within a predetermined boundary
US6414587B1 (en) 1998-03-13 2002-07-02 The Chamberlain Group, Inc. Code learning system for a movable barrier operator
US6980655B2 (en) 2000-01-21 2005-12-27 The Chamberlain Group, Inc. Rolling code security system
US7492905B2 (en) 1995-05-17 2009-02-17 The Chamberlain Group, Inc. Rolling code security system
US5661804A (en) 1995-06-27 1997-08-26 Prince Corporation Trainable transceiver capable of learning variable codes
KR100378112B1 (en) 1995-07-25 2003-05-23 삼성전자주식회사 Automatic locking/unlocking system using wireless communication and method for the same
FR2737373B3 (en) 1995-07-25 1997-08-22 Lafage Marc PROCESS FOR TRANSFORMING DIGITAL SIGNALS FOR REALIZING INTERFACES FOR COMPUTERS ACCORDING TO THE XMIDI STANDARD
JP2704144B2 (en) 1995-07-28 1998-01-26 日本電気アイシーマイコンシステム株式会社 Serial data transmission device and control method therefor
US6052408A (en) 1995-09-06 2000-04-18 Aironet Wireless Communications, Inc. Cellular communication system with dynamically modified data transmission parameters
US5898397A (en) 1996-01-16 1999-04-27 Stanley Home Automation Remote control transmitter and method of operation
US5699065A (en) 1996-01-16 1997-12-16 Stanley Home Automation Remote control transmitter and method of operation
TW302588B (en) 1996-03-05 1997-04-11 Microchip Tech Inc Method and apparatus for electronic encoding and decoding
US5969637A (en) 1996-04-24 1999-10-19 The Chamberlain Group, Inc. Garage door opener with light control
US5872513A (en) 1996-04-24 1999-02-16 The Chamberlain Group, Inc. Garage door opener and wireless keypad transmitter with temporary password feature
US6130602A (en) * 1996-05-13 2000-10-10 Micron Technology, Inc. Radio frequency data communications device
JPH09322274A (en) 1996-05-29 1997-12-12 Mitsubishi Cable Ind Ltd Remote controller
US6049289A (en) 1996-09-06 2000-04-11 Overhead Door Corporation Remote controlled garage door opening system
JP3748635B2 (en) 1996-09-20 2006-02-22 アルプス電気株式会社 Communication device
US6012144A (en) 1996-10-08 2000-01-04 Pickett; Thomas E. Transaction security method and apparatus
US6275519B1 (en) 1996-11-21 2001-08-14 Dsp Group, Inc. Frame synchronization in a digital communications system
US5923758A (en) 1997-01-30 1999-07-13 Delco Electronics Corp. Variable key press resynchronization for remote keyless entry systems
US5949349A (en) 1997-02-19 1999-09-07 The Chamberlain Group, Inc. Code responsive radio receiver capable of operation with plural types of code transmitters
US6181255B1 (en) 1997-02-27 2001-01-30 The Chamberlain Group, Inc. Multi-frequency radio frequency transmitter with code learning capability
US7221256B2 (en) 1997-05-20 2007-05-22 Johnson Controls Technology Company Trainable transceiver
US6010221A (en) 1997-05-22 2000-01-04 Nikon Corporation Projection type display apparatus
US6058137A (en) 1997-09-15 2000-05-02 Partyka; Andrzej Frequency hopping system for intermittent transmission
US7979173B2 (en) 1997-10-22 2011-07-12 Intelligent Technologies International, Inc. Autonomous vehicle travel control systems and methods
US6137421A (en) 1997-11-12 2000-10-24 Prince Corporation Method and apparatus for storing a data encoded signal
US6243000B1 (en) 1998-02-13 2001-06-05 Philip Y. W. Tsui Wireless rolling code security system
EP0937845B1 (en) 1998-02-24 2004-03-24 Delphi Automotive Systems Deutschland GmbH Releasing system as means of releasing functions
FR2778809B1 (en) 1998-05-18 2000-07-28 Inst Nat Rech Inf Automat INSTALLATION FOR TRANSMITTING MESSAGES WITH IMPROVED STATIONS, AND CORRESPONDING METHOD
US6473506B1 (en) 1998-10-13 2002-10-29 Telefonaktiebolaget Lm Ericsson (Publ) Signaling using phase rotation techniques in a digital communications system
GB2340701B (en) 1998-08-15 2003-06-25 Roke Manor Research Programmable packet header processor
JP3427971B2 (en) 1998-08-24 2003-07-22 ソニー株式会社 Communication control method
US6754266B2 (en) 1998-10-09 2004-06-22 Microsoft Corporation Method and apparatus for use in transmitting video information over a communication network
US7039809B1 (en) 1998-11-12 2006-05-02 Mastercard International Incorporated Asymmetric encrypted pin
US6070154A (en) 1998-11-27 2000-05-30 Activepoint Ltd. Internet credit card security
US6463538B1 (en) 1998-12-30 2002-10-08 Rainbow Technologies, Inc. Method of software protection using a random code generator
EP1024626A1 (en) 1999-01-27 2000-08-02 International Business Machines Corporation Method, apparatus, and communication system for exchange of information in pervasive environments
US6396446B1 (en) 1999-02-16 2002-05-28 Gentex Corporation Microwave antenna for use in a vehicle
IL128720A (en) 1999-02-25 2009-06-15 Cidway Technologies Ltd Method for certification of over the phone transactions
US6229434B1 (en) 1999-03-04 2001-05-08 Gentex Corporation Vehicle communication system
US6564253B1 (en) 1999-05-07 2003-05-13 Recording Industry Association Of America Content authorization system over networks including searching and reporting for unauthorized content locations
US7346374B2 (en) 1999-05-26 2008-03-18 Johnson Controls Technology Company Wireless communications system and method
EP1194903B1 (en) 1999-05-26 2013-11-13 Johnson Controls Technology Company Wireless communications system and method
US6978126B1 (en) 1999-06-07 2005-12-20 Johnson Controls Technology Company Transceiver with closed loop control of antenna tuning and power level
US7046161B2 (en) 1999-06-16 2006-05-16 Universal Electronics Inc. System and method for automatically setting up a universal remote control
US7154858B1 (en) 1999-06-30 2006-12-26 Cisco Technology, Inc. System and method for measuring latency of a selected path of a computer network
US6496477B1 (en) 1999-07-09 2002-12-17 Texas Instruments Incorporated Processes, articles, and packets for network path diversity in media over packet applications
US6930983B2 (en) 2000-03-15 2005-08-16 Texas Instruments Incorporated Integrated circuits, systems, apparatus, packets and processes utilizing path diversity for media over packet applications
US6861942B1 (en) 1999-07-21 2005-03-01 Gentex Corporation Directionally-adjustable antenna system using an outside mirror for automotive applications
US6703941B1 (en) 1999-08-06 2004-03-09 Johnson Controls Technology Company Trainable transmitter having improved frequency synthesis
US6549949B1 (en) 1999-08-31 2003-04-15 Accenture Llp Fixed format stream in a communication services patterns environment
US6640244B1 (en) 1999-08-31 2003-10-28 Accenture Llp Request batcher in a transaction services patterns environment
JP2001115696A (en) 1999-10-13 2001-04-24 Alps Electric Co Ltd Communication device
US6850910B1 (en) 1999-10-22 2005-02-01 Matsushita Electric Industrial Co., Ltd. Active data hiding for secure electronic media distribution
US6456726B1 (en) 1999-10-26 2002-09-24 Matsushita Electric Industrial Co., Ltd. Methods and apparatus for multi-layer data hiding
US6963270B1 (en) * 1999-10-27 2005-11-08 Checkpoint Systems, Inc. Anticollision protocol with fast read request and additional schemes for reading multiple transponders in an RFID system
US6829357B1 (en) 1999-12-14 2004-12-07 Trw Inc. Communication system having a transmitter and a receiver that engage in reduced size encrypted data communication
US7642895B2 (en) 1999-12-20 2010-01-05 The Chamberlain Group, Inc. Garage door operator having thumbprint identification system
SG147300A1 (en) 2000-02-02 2008-11-28 Ntt Docomo Inc A single carrier/ds-cdma packet transmission method, an uplink packet transmission method in a multi-carrier/ds-cdma mobile communications system, and a structure of a downlink channel in a multi-carrier/ds-cdma mobile communications system
JP2001223690A (en) 2000-02-08 2001-08-17 Io Network:Kk Information communication method
US6579213B1 (en) 2000-02-29 2003-06-17 Hoist Fitness Systems Exercise arm assembly for exercise machine
US6291968B1 (en) 2000-05-08 2001-09-18 Lear Corporation System for automatically charging the battery of a remote transmitter for use in a vehicle security system
US7050479B1 (en) 2000-05-12 2006-05-23 The Titan Corporation System for, and method of, providing frequency hopping
US6980518B1 (en) 2000-06-23 2005-12-27 International Business Machines Corporation Gossip-based reliable multicast message recovery system and method
WO2002014991A2 (en) 2000-08-11 2002-02-21 Incanta, Inc. Resource distribution in network environment
WO2002019124A1 (en) 2000-08-30 2002-03-07 Matsushita Electric Industrial Co.,Ltd. Authentication system, authentication request device, validating device, and service medium
DE10059991A1 (en) * 2000-12-02 2002-06-06 Bosch Gmbh Robert Device for the keyless operation of a motor vehicle
US6963561B1 (en) 2000-12-15 2005-11-08 Atrica Israel Ltd. Facility for transporting TDM streams over an asynchronous ethernet network using internet protocol
EP1216899A1 (en) 2000-12-22 2002-06-26 Ford Global Technologies, Inc. Communication system for use with a vehicle
DE10100952A1 (en) 2001-01-10 2002-07-25 Deutsch Zentr Luft & Raumfahrt Method for the simultaneous transmission of several data streams
US20020184504A1 (en) 2001-03-26 2002-12-05 Eric Hughes Combined digital signature
US7516325B2 (en) 2001-04-06 2009-04-07 Certicom Corp. Device authentication in a PKI
US7301900B1 (en) 2001-05-24 2007-11-27 Vixs Systems Inc Method and apparatus for hub-based network access via a multimedia system
US20020183008A1 (en) 2001-05-29 2002-12-05 Menard Raymond J. Power door control and sensor module for a wireless system
US7151831B2 (en) 2001-06-06 2006-12-19 Sony Corporation Partial encryption and PID mapping
US20020191785A1 (en) 2001-06-14 2002-12-19 International Business Machines Corporation Apparatus and method for encrypting and decrypting data with incremental data validation
US20100029261A1 (en) 2001-06-27 2010-02-04 John Mikkelsen Virtual wireless data cable method, apparatus and system
US6634408B2 (en) 2001-07-10 2003-10-21 Wesley M. Mays Automatic barrier operator system
WO2003007483A1 (en) 2001-07-13 2003-01-23 Alcatel Method for transporting real-time data on a radio packet communication network
US7028098B2 (en) 2001-07-20 2006-04-11 Nokia, Inc. Selective routing of data flows using a TCAM
EP1410191A2 (en) 2001-07-26 2004-04-21 Kyocera Wireless Corporation System and method for the management of wireless communications device system software downloads in the field
US7697027B2 (en) 2001-07-31 2010-04-13 Donnelly Corporation Vehicular video system
US7207061B2 (en) 2001-08-31 2007-04-17 International Business Machines Corporation State machine for accessing a stealth firewall
US7352868B2 (en) 2001-10-09 2008-04-01 Philip Hawkes Method and apparatus for security in a data processing system
US7099469B2 (en) 2001-10-17 2006-08-29 Motorola, Inc. Method of scrambling and descrambling data in a communication system
US7564827B2 (en) 2001-10-19 2009-07-21 Alcatel-Lucent Usa Inc. Adaptive hybrid retransmission method for wireless communications
TW508474B (en) 2001-11-15 2002-11-01 Coretronic Corp System and method for improvement of asymmetric projection illumination
KR100561838B1 (en) 2001-11-16 2006-03-16 삼성전자주식회사 Efficient transmission and receiving apparatus for multicast data and method thereof
US6956460B2 (en) 2002-01-15 2005-10-18 Tsui Philip Y W Transmitter for operating rolling code receivers
US6658328B1 (en) * 2002-01-17 2003-12-02 Trw Inc. Passive function control system for a motor vehicle
US6688518B1 (en) 2002-01-31 2004-02-10 Anthony Valencia Wall-mounted touch screen information system
US7146009B2 (en) 2002-02-05 2006-12-05 Surety, Llc Secure electronic messaging system requiring key retrieval for deriving decryption keys
US7221764B2 (en) 2002-02-14 2007-05-22 Agere Systems Inc. Security key distribution using key rollover strategies for wireless networks
US7173514B2 (en) 2002-03-15 2007-02-06 Wayne-Dalton Corp. Operator for a movable barrier and method of use
CA2474915A1 (en) 2002-03-18 2003-09-25 Colin Martin Schmidt Session key distribution methods using a hierarchy of key servers
AU2003226034A1 (en) 2002-04-09 2003-10-27 Honeywell International, Inc. Security control and communication system and method
US20030197595A1 (en) 2002-04-22 2003-10-23 Johnson Controls Technology Company System and method for wireless control of multiple remote electronic systems
US7057547B2 (en) 2002-05-21 2006-06-06 The Chamberlain Group, Inc. Mounted remote control unit with plug-in module interface
US6975203B2 (en) 2002-06-06 2005-12-13 The Chamberlain Group, Inc. Universal barrier operator transmitter
US7333615B1 (en) 2002-06-26 2008-02-19 At&T Delaware Intellectual Property, Inc. Encryption between multiple devices
US7305084B2 (en) 2002-07-24 2007-12-04 Qualcomm Incorporated Fast encryption and authentication for data processing systems
US7287164B2 (en) 2002-09-12 2007-10-23 International Business Machines Corporation Method and system for encoding signatures to authenticate files
US7219176B2 (en) 2002-09-30 2007-05-15 Marvell International Ltd. System and apparatus for early fixed latency subtractive decoding
US6842106B2 (en) * 2002-10-04 2005-01-11 Battelle Memorial Institute Challenged-based tag authentication model
US7911358B2 (en) 2002-10-08 2011-03-22 Johnson Controls Technology Company System and method for enrollment of a remotely controlled device in a trainable transmitter
US8531266B2 (en) 2002-10-18 2013-09-10 Johnson Controls Technology Company System and method for providing an in-vehicle transmitter having multi-colored LED
US20040081075A1 (en) 2002-10-18 2004-04-29 Kazuaki Tsukakoshi Code modulation adaptive and variable multiplexing transmission method and code modulation adaptive and variable multiplexing transmission apparatus
WO2004077729A2 (en) 2003-02-21 2004-09-10 Johnson Controls Technology Company Trainable remote controller and method for determining the frequency of a learned control signal
US8174357B2 (en) 2002-11-08 2012-05-08 Johnson Controls Technology Company System and method for training a transmitter to control a remote control system
EP1562802A2 (en) 2002-11-08 2005-08-17 Johnson Controls Technology Company Trainable transceiver system
US7493140B2 (en) 2003-01-22 2009-02-17 Johnson Controls Technology Company System, method and device for providing communication between a vehicle and a plurality of wireless devices having different communication standards
US7023322B2 (en) 2003-02-04 2006-04-04 Donnelly Corporation Garage door opening system for vehicle
US20040179485A1 (en) 2003-03-12 2004-09-16 Terrier Carl M. Method of transmitting and receiving two-way serial digital signals in a wireless network utilizing a simplified baseband processor
US20040181569A1 (en) 2003-03-13 2004-09-16 Attar Rashid Ahmed Method and system for a data transmission in a communication system
US7610487B2 (en) 2003-03-27 2009-10-27 Microsoft Corporation Human input security codes
US7042363B2 (en) 2003-04-02 2006-05-09 General Motors Corporation Methods and apparatus for producing a three-state single wire control
US6998977B2 (en) 2003-04-28 2006-02-14 The Chamberlain Group, Inc. Method and apparatus for monitoring a movable barrier over a network
ITBS20030048A1 (en) 2003-05-20 2004-11-21 Rib Srl FIXED CODE AND VARIABLE CODE RADIO SYSTEM.
US8330569B2 (en) 2003-05-28 2012-12-11 Johnson Controls Technology Company System and method for receiving data for training a trainable transmitter
KR20050005150A (en) 2003-07-04 2005-01-13 엘지전자 주식회사 system and method for opening door using mobile
US7088218B2 (en) 2003-07-30 2006-08-08 Lear Corporation Wireless appliance activation transceiver
US7161466B2 (en) 2003-07-30 2007-01-09 Lear Corporation Remote control automatic appliance activation
US7039397B2 (en) 2003-07-30 2006-05-02 Lear Corporation User-assisted programmable appliance control
US7068181B2 (en) 2003-07-30 2006-06-27 Lear Corporation Programmable appliance remote control
AU2003904317A0 (en) 2003-08-13 2003-08-28 Securicom (Nsw) Pty Ltd Remote entry system
JP4235506B2 (en) 2003-08-14 2009-03-11 株式会社エヌ・ティ・ティ・ドコモ Transmission device, relay device, and program
US20050053022A1 (en) 2003-08-28 2005-03-10 The Boeing Company Encoding and merging multiple data streams of fibre channel network
US7668125B2 (en) 2003-09-09 2010-02-23 Qualcomm Incorporated Incremental redundancy transmission for multiple parallel channels in a MIMO communication system
US7505589B2 (en) 2003-09-09 2009-03-17 Temarylogic, Llc Ternary and higher multi-value digital scramblers/descramblers
US7389530B2 (en) 2003-09-12 2008-06-17 International Business Machines Corporation Portable electronic door opener device and method for secure door opening
US20050058153A1 (en) 2003-09-15 2005-03-17 John Santhoff Common signaling method
US7415618B2 (en) 2003-09-25 2008-08-19 Sun Microsystems, Inc. Permutation of opcode values for application program obfuscation
US7353499B2 (en) 2003-09-25 2008-04-01 Sun Microsystems, Inc. Multiple instruction dispatch tables for application program obfuscation
US7346163B2 (en) 2003-10-31 2008-03-18 Sony Corporation Dynamic composition of pre-encrypted video on demand content
US20050101314A1 (en) 2003-11-10 2005-05-12 Uri Levi Method and system for wireless group communications
US7920601B2 (en) 2003-12-19 2011-04-05 Gentex Corporation Vehicular communications system having improved serial communication
DE10360120B3 (en) * 2003-12-20 2005-10-13 Daimlerchrysler Ag Rolling code based method
US7289014B2 (en) 2003-12-23 2007-10-30 Wayne-Dalton Corp. System for automatically moving access barriers and methods for using the same
US7778604B2 (en) 2004-01-30 2010-08-17 Lear Corporation Garage door opener communications gateway module for enabling communications among vehicles, house devices, and telecommunications networks
WO2005073938A1 (en) 2004-02-02 2005-08-11 Mobile Reach Media Inc. Monitoring method and system
US7839263B2 (en) 2004-03-16 2010-11-23 Johnson Controls Technology Company System and method of training in a transmit/receive system
US7205908B2 (en) 2004-03-18 2007-04-17 Gallen Ka Leung Tsui Systems and methods for proximity control of a barrier
US7088265B2 (en) 2004-03-18 2006-08-08 Gallen Ka Leung Tsui Systems and methods for proximity control of a barrier
US7332999B2 (en) 2004-04-19 2008-02-19 The Chamberlain Group, Inc. System and method for operating multiple moveable barrier operators
US7266344B2 (en) 2004-06-02 2007-09-04 Wayne-Dalton Corp. Remotely activated bridge device for use with a home network and methods for programming and using the same
US20050285719A1 (en) 2004-06-24 2005-12-29 Intel Corporation Method and apparatus to manage reverse data flow in a high throughput wireless network
US8014377B2 (en) 2004-06-24 2011-09-06 Nortel Networks Limited Efficient location updates, paging and short bursts
US7548153B2 (en) 2004-07-09 2009-06-16 Tc License Ltd. Multi-protocol or multi-command RFID system
ATE487286T1 (en) 2004-07-27 2010-11-15 Johnson Controls Tech Co SELF-LEARNING TRANSMITTER/RECEIVER
US7742501B2 (en) 2004-08-06 2010-06-22 Ipeak Networks Incorporated System and method for higher throughput through a transportation network
US20060046794A1 (en) 2004-08-31 2006-03-02 The Chamberlain Group, Inc. System and method for transmitting barrier control signals from a wireless device
US20060083187A1 (en) 2004-10-18 2006-04-20 Mobile (R&D) Ltd. Pairing system and method for wirelessly connecting communication devices
KR100649571B1 (en) 2004-10-21 2006-11-28 주식회사 아이레보 Registration and Deletion Method of Wireless Transmitter-Receiver for Digital Door Lock, and Digital Door Lock and Wireless Transmitter-Receiver using the same
DE602005005213T2 (en) 2004-10-21 2009-04-23 Philips Intellectual Property & Standards Gmbh SLAVE BUS PARTICIPANT FOR A SERIAL DATA BUS
US7205882B2 (en) 2004-11-10 2007-04-17 Corestreet, Ltd. Actuating a security system using a wireless device
US20060103503A1 (en) 2004-11-12 2006-05-18 Yan Rodriguez Networked movable barrier operator system
US7535926B1 (en) 2005-01-07 2009-05-19 Juniper Networks, Inc. Dynamic interface configuration for supporting multiple versions of a communication protocol
US7446644B2 (en) 2005-01-14 2008-11-04 Secureall Corporation Universal hands free key and lock system
US20080189557A1 (en) 2005-01-19 2008-08-07 Stmicroelectronics S.R.I. Method and architecture for restricting access to a memory device
US7532965B2 (en) 2005-01-25 2009-05-12 Johnson Controls Technology Company System and method for providing user interface functionality based on location
US7071850B1 (en) 2005-01-27 2006-07-04 The Chamberlain Group, Inc. Method and apparatus to facilitate transmission of ternary movable barrier operator information
US7482923B2 (en) 2005-01-27 2009-01-27 The Chamberlain Group, Inc. Alarm system interaction with a movable barrier operator method and apparatus
US9148409B2 (en) 2005-06-30 2015-09-29 The Chamberlain Group, Inc. Method and apparatus to facilitate message transmission and reception using different transmission characteristics
US8422667B2 (en) 2005-01-27 2013-04-16 The Chamberlain Group, Inc. Method and apparatus to facilitate transmission of an encrypted rolling code
US7598855B2 (en) 2005-02-01 2009-10-06 Location Based Technologies, Inc. Apparatus and method for locating individuals and objects using tracking devices
ES2921886T3 (en) 2005-03-18 2022-09-01 Gatekeeper Systems Inc Two-way communication system for tracking the location and status of wheeled vehicles
US7864070B2 (en) 2005-03-22 2011-01-04 Johnson Controls Technology Company System and method for training a trainable transmitter
JP2006277199A (en) 2005-03-29 2006-10-12 Fujitsu Ltd Delivery object management system and delivery object storage warehouse
US20070006319A1 (en) 2005-06-30 2007-01-04 Fitzgibbon James J Method and apparatus to facilitate message transmission and reception using multiple forms of message alteration
US8183980B2 (en) 2005-08-31 2012-05-22 Assa Abloy Ab Device authentication using a unidirectional protocol
US8787823B2 (en) 2005-09-19 2014-07-22 Lojack Corporation Recovery system with repeating communication capabilities
US7999656B2 (en) 2005-10-26 2011-08-16 Sentrilock, Llc Electronic lock box with key presence sensing
JP2007133527A (en) 2005-11-09 2007-05-31 Fujifilm Corp Clock signal generation circuit, semiconductor integrated circuit, and frequency-division rate control method
US8000667B2 (en) 2006-02-03 2011-08-16 Johnson Controls Technology Company System and method for compensating for modulation induced frequency shift during transmission of a radio frequency signal
FR2898204B1 (en) 2006-03-02 2014-06-20 Patrick Hurpin METHOD AND SYSTEM FOR COLLECTIVE TRANSPORT
JP4810289B2 (en) 2006-04-17 2011-11-09 ルネサスエレクトロニクス株式会社 Message authenticator generation device, message authenticator verification device, and message authentication system
EP1865656A1 (en) 2006-06-08 2007-12-12 BRITISH TELECOMMUNICATIONS public limited company Provision of secure communications connection using third party authentication
US8111179B2 (en) 2006-07-21 2012-02-07 Gentex Corporation Method and system for reducing signal distortion in a continuously variable slope delta modulation scheme
US8760267B2 (en) 2006-08-28 2014-06-24 Gentex Corporation System and method for enrollment of a remotely controlled device in a trainable transmitter
US7889050B2 (en) 2006-08-31 2011-02-15 Johnson Controls Technology Company System and method for training a trainable transmitter
EP3190572B1 (en) 2006-09-14 2018-12-12 Crown Equipment Corporation Method of remotely controlling a materials handling vehicle
EP2110000B1 (en) 2006-10-11 2018-12-26 Visteon Global Technologies, Inc. Wireless network selection
EP2084629A1 (en) 2006-11-14 2009-08-05 Johnson Controls Technology Company System and method of synchronizing an in-vehicle control system with a remote source
US8643465B2 (en) 2006-12-04 2014-02-04 The Chamberlain Group, Inc. Network ID activated transmitter
US8384580B2 (en) 2006-12-21 2013-02-26 Johnson Controls Technology Company System and method for extending transmitter training window
EP2126869B1 (en) 2006-12-21 2017-08-02 Gentex Corporation Remote control system and method
US7839851B2 (en) 2006-12-22 2010-11-23 Ntt Docomo, Inc. Method and apparatus for opportunistic multicasting with coded scheduling in wireless networks
US8615562B1 (en) 2006-12-29 2013-12-24 Google Inc. Proxy for tolerating faults in high-security systems
US20080194291A1 (en) 2007-01-29 2008-08-14 Martin Robert C Device and method for remotely operating keyless entry systems
KR101405936B1 (en) 2007-02-02 2014-06-17 엘지전자 주식회사 method of transmitting and receiving a message regarding a power saving mode in broadband wireless access system
US8330572B2 (en) 2007-03-16 2012-12-11 Homerun Holdings Corporation Multiple barrier control system
US8209550B2 (en) 2007-04-20 2012-06-26 Telefonaktiebolaget Lm Ericsson (Publ) Method and apparatus for protecting SIMLock information in an electronic device
US8841988B2 (en) 2007-05-22 2014-09-23 Lear Corporation System having key fob operable to remotely control a garage door via remote keyless entry receiver and garage door opener transmitter interconnected by vehicle bus
US20080303630A1 (en) 2007-06-06 2008-12-11 Danilo Jose Martinez DigiKey and DigiLock
US8207818B2 (en) 2007-06-08 2012-06-26 The Chamberlain Group, Inc. Method and apparatus regarding a movable barrier operator remote control transmitter kit
US8130079B2 (en) 2007-08-15 2012-03-06 At&T Intellectual Property I, L.P. Methods, systems, and products for discovering electronic devices
CN101399825A (en) 2007-09-29 2009-04-01 华为技术有限公司 Method, device and system for sharing matched pair information between equipments
GB2453383A (en) 2007-10-05 2009-04-08 Iti Scotland Ltd Authentication method using a third party
US20090096621A1 (en) 2007-10-11 2009-04-16 Sharp Laboratories Of America, Inc. Systems and methods for configuring notification messages about electronic device conditions
US8103655B2 (en) 2007-10-30 2012-01-24 Oracle International Corporation Specifying a family of logics defining windows in data stream management systems
US9324230B2 (en) 2008-12-04 2016-04-26 Gentex Corporation System and method for configuring a wireless control system of a vehicle using induction field communication
US20090176451A1 (en) 2008-01-04 2009-07-09 Microsoft Corporation Encoded color information facilitating device pairing for wireless communication
WO2009135312A1 (en) 2008-05-08 2009-11-12 Unify4Life Corporation Remote control system and method
US20090315672A1 (en) 2008-06-18 2009-12-24 Lear Corporation Method of programming a wireless transmitter to a wireless receiver
KR101253190B1 (en) 2008-08-08 2013-04-10 엘지전자 주식회사 Method of reporting a channel quality information and assigning radio resource accordign to the channel quality information in a wireless communication system
CN102187375B (en) 2008-10-13 2016-07-13 金泰克斯公司 Communication system and method
CN101729340B (en) 2008-10-31 2011-09-28 鸿富锦精密工业(深圳)有限公司 Wireless network access device and mating method thereof
US9881297B2 (en) 2008-11-14 2018-01-30 Mastercard International Incorporated Methods and systems for secure mobile device initiated payments using generated image data
US8311490B2 (en) 2008-12-24 2012-11-13 Johnson Controls Technology Company Systems and methods for configuring and operating a wireless control system in a vehicle for activation of a remote device
US8643467B2 (en) 2009-01-02 2014-02-04 Johnson Controls Technology Company System and method for causing garage door opener to open garage door using sensor input
US8699704B2 (en) 2010-01-13 2014-04-15 Entropic Communications, Inc. Secure node admission in a communication network
US7973678B2 (en) 2009-02-02 2011-07-05 Robert Bosch Gmbh Control of building systems based on the location and movement of a vehicle tracking device
US8837716B2 (en) 2009-02-02 2014-09-16 Apple Inc. Sensor derived authentication for establishing peer-to-peer networks
US9467518B2 (en) 2009-02-16 2016-10-11 Communitake Technologies Ltd. System, a method and a computer program product for automated remote control
US8208888B2 (en) 2009-02-17 2012-06-26 Johnson Controls Technology Company Vehicle to vehicle wireless control system training
US8510558B2 (en) 2009-02-17 2013-08-13 Alcatel Lucent Identity based authenticated key agreement protocol
US8581695B2 (en) 2009-05-27 2013-11-12 Grant B. Carlson Channel-switching remote controlled barrier opening system
US9124424B2 (en) 2009-06-18 2015-09-01 Arvato Digital Services Llc System, apparatus and method for license key permutation
CA2708000A1 (en) 2009-06-18 2010-12-18 Arvato Digital Services Canada, Inc. System, apparatus and method for license key permutation
US8570158B2 (en) 2009-08-13 2013-10-29 At&T Intellectual Property I, L.P. Programming a universal remote control via a point-of-sale system
EP2290872B1 (en) 2009-08-27 2014-06-18 Nxp B.V. Device for generating a message authentication code for authenticating a message
US20110131132A1 (en) 2009-11-27 2011-06-02 Eazybreak Oy System and method for managing subscriber account
FI20090449L (en) 2009-11-27 2011-05-28 Eazybreak Oy System and procedure for granting access to a system
EP2526665B1 (en) 2010-01-22 2017-08-02 Gentex Corporation Universal wireless trainable transceiver unit with integrated bidirectional wireless interface for vehicles
EP2532116A4 (en) 2010-02-04 2015-11-18 Gentex Corp System and method for wireless re-programming of memory in a communication system
US20110218965A1 (en) 2010-03-03 2011-09-08 Htc Corporation System for remotely erasing data, method, server, and mobile device thereof, and computer program product
US8578205B2 (en) 2010-03-15 2013-11-05 Cleversafe, Inc. Requesting cloud data storage
DE102010015104A1 (en) 2010-04-16 2011-10-20 Audi Ag Method for opening and/or closing of garage door for motor car at house, involves sending signal from transmitter of vehicle to receiver of access device, and opening or closing access device based on decoded signal
US20110273268A1 (en) 2010-05-10 2011-11-10 Fred Bassali Sparse coding systems for highly secure operations of garage doors, alarms and remote keyless entry
US8656170B2 (en) 2010-05-28 2014-02-18 Cisco Technology, Inc. Protection of control plane traffic against replayed and delayed packet attack
US10375252B2 (en) 2010-06-01 2019-08-06 Ternarylogic Llc Method and apparatus for wirelessly activating a remote mechanism
US20110316668A1 (en) 2010-06-24 2011-12-29 Laird Edward T Method and Apparatus to Facilitate Message Transmission and Reception Via Wireline Using Different Transmission Characteristics
CA2742018A1 (en) 2010-06-24 2011-12-24 The Chamberlain Group, Inc. Method and apparatus to facilitate wireline transmission of an encrypted rolling code
US8648706B2 (en) 2010-06-24 2014-02-11 Honeywell International Inc. Alarm management system having an escalation strategy
US20110317835A1 (en) 2010-06-24 2011-12-29 Laird Edward T Method and Apparatus to Facilitate Wireline Transmission of an Encrypted Rolling Code
US8699708B2 (en) 2010-06-29 2014-04-15 Alcatel Lucent Light-weight security solution for host-based mobility and multihoming protocols
US8464061B2 (en) 2010-08-30 2013-06-11 Apple Inc. Secure wireless link between two devices using probes
US9160408B2 (en) 2010-10-11 2015-10-13 Sunpower Corporation System and method for establishing communication with an array of inverters
US9734645B2 (en) 2010-10-15 2017-08-15 The Chamberlain Group, Inc. Method and apparatus pertaining to message-based functionality
US8836469B2 (en) 2010-10-15 2014-09-16 The Chamberlain Group, Inc. Method and apparatus to accommodate both a learn mode of operation and a pairing mode of operation during a relationship-establishment mode of operation
US20120105195A1 (en) 2010-10-29 2012-05-03 Johnson Controls Technology Company Wireless transceiver with recall indicator
US8638198B2 (en) 2010-11-30 2014-01-28 Verizon Patent And Licensing Inc. Universal remote control systems, methods, and apparatuses
CN103283175A (en) 2010-12-28 2013-09-04 日本电气株式会社 Method of generating key
US9412264B2 (en) 2011-01-28 2016-08-09 Gentex Corporation Wireless trainable transceiver device with integrated interface and GPS modules
US9336637B2 (en) 2011-03-17 2016-05-10 Unikey Technologies Inc. Wireless access control system and related methods
US9032493B2 (en) 2011-03-31 2015-05-12 Intel Corporation Connecting mobile devices, internet-connected vehicles, and cloud services
US8994496B2 (en) 2011-04-01 2015-03-31 The Chamberlain Group, Inc. Encrypted communications for a moveable barrier environment
US9229905B1 (en) 2011-04-22 2016-01-05 Angel A. Penilla Methods and systems for defining vehicle user profiles and managing user profiles via cloud systems and applying learned settings to user profiles
US9388621B2 (en) 2011-05-24 2016-07-12 Overhead Door Corporation Decryption of access codes of diverse protocols in barrier operator systems
US9425981B2 (en) 2011-07-14 2016-08-23 Colin Foster Remote access control to residential or office buildings
EP2736759B1 (en) 2011-07-26 2018-09-05 Gogoro Inc. Apparatus, method and article for providing vehicle diagnostic data
CN103930931A (en) 2011-09-23 2014-07-16 金泰克斯公司 Systems and methods for rear view mirror displays
US8634777B2 (en) 2011-09-26 2014-01-21 Broadcom Corporation Pairing with directional code sequence
US8766770B2 (en) 2011-10-10 2014-07-01 Fred Bassali Universal transceivers and supplementary receivers with sparse coding technique option
US8837608B2 (en) 2011-12-02 2014-09-16 Gentex Corporation Systems and methods for configuring and operating a wireless control system in a vehicle for activation of a remote device
US20130147600A1 (en) 2011-12-09 2013-06-13 The Chamberlain Group, Inc. Access Authorization via Location-Aware Authorization Device
EP2788959B1 (en) 2011-12-09 2017-02-15 Gentex Corporation System and method for training a programmable transceiver
US20140310379A1 (en) 2013-04-15 2014-10-16 Flextronics Ap, Llc Vehicle initiated communications with third parties via virtual personality
US9495690B2 (en) 2012-04-04 2016-11-15 Visa International Service Association Systems and methods to process transactions and offers via a gateway
US9146603B2 (en) 2012-05-08 2015-09-29 William Reber, Llc Cloud computing system, vehicle cloud processing device and methods for use therewith
US9443422B2 (en) 2012-11-07 2016-09-13 Gentex Corporation Frequency shifting method for universal transmitters
US9122254B2 (en) 2012-11-08 2015-09-01 The Chamberlain Group, Inc. Barrier operator feature enhancement
US20140169292A1 (en) 2012-12-12 2014-06-19 Qualcomm Incorporated System and method for improved communication on a wireless network
US9075686B2 (en) 2013-02-25 2015-07-07 GM Global Technology Operations LLC System and method to improve control module reflash time
CN105264574B (en) 2013-03-05 2018-11-13 金泰克斯公司 Vehicular communication system remote control reception antenna
US9316038B2 (en) 2013-03-15 2016-04-19 Overhead Door Corporation Factory programming of paired authorization codes in wireless transmitter and door operator
US9396598B2 (en) 2014-10-28 2016-07-19 The Chamberlain Group, Inc. Remote guest access to a secured premises
US10229548B2 (en) 2013-03-15 2019-03-12 The Chamberlain Group, Inc. Remote guest access to a secured premises
US9367978B2 (en) 2013-03-15 2016-06-14 The Chamberlain Group, Inc. Control device access method and apparatus
US9449449B2 (en) 2013-03-15 2016-09-20 The Chamberlain Group, Inc. Access control operator diagnostic control
US9148416B2 (en) 2013-03-15 2015-09-29 Airwatch Llc Controlling physical access to secure areas via client devices in a networked environment
US9367676B2 (en) 2013-03-22 2016-06-14 Nok Nok Labs, Inc. System and method for confirming location using supplemental sensor and/or location data
JP5895167B2 (en) 2013-04-09 2016-03-30 パナソニックIpマネジメント株式会社 Wireless communication method and wireless communication system
US10008034B2 (en) 2013-05-03 2018-06-26 Nvidia Corporation System, method, and computer program product for computing indirect lighting in a cloud network
GB201308065D0 (en) 2013-05-03 2013-06-12 Now 2 Now Ltd Near field communication device data system
US9280704B2 (en) 2013-06-12 2016-03-08 The Code Corporation Communicating wireless pairing information for pairing an electronic device to a host system
US20150002262A1 (en) 2013-06-28 2015-01-01 Johnson Controls Technology Company Battery powered rear view mirror display and integrated trainable transceiver unit
KR102105959B1 (en) 2013-07-22 2020-04-29 엘지전자 주식회사 Foldable display device providing image layer and method for controlling the same
US10733823B2 (en) 2013-07-26 2020-08-04 Skybell Technologies Ip, Llc Garage door communication systems and methods
US9142064B2 (en) 2013-08-07 2015-09-22 Zf Friedrichshafen Ag System for detecting vehicle driving mode and method of conducting the same
WO2015028446A1 (en) 2013-08-28 2015-03-05 Agfa Healthcare System and method for pairing devices
US20150084750A1 (en) 2013-09-25 2015-03-26 The Chamberlain Group, Inc. Appliance Control Using Destination Information
DE102013111087B4 (en) 2013-10-07 2020-11-19 Vodafone Holding Gmbh Securing a means of transport against unauthorized use or theft
US9317984B2 (en) 2013-10-28 2016-04-19 Smartlabs, Inc. Systems and methods to control locking and unlocking of doors using powerline and radio frequency communications
US10097680B2 (en) 2013-11-01 2018-10-09 Gentex Corporation Trainable transceiver module
WO2015073810A1 (en) 2013-11-15 2015-05-21 Gentex Corporation Internet-connected garage door control system
US20150161832A1 (en) 2013-12-05 2015-06-11 Ford Global Technologies, Llc Method and Apparatus for Virtual Key Delivery
US20150187019A1 (en) 2013-12-31 2015-07-02 Hartford Fire Insurance Company Systems and method for autonomous vehicle data processing
US9603015B2 (en) 2014-02-03 2017-03-21 Empire Technology Development Llc Encrypted communication between paired devices
AU2015214079C1 (en) 2014-02-05 2017-01-19 Apple Inc. Uniform communication protocols for communication between controllers and accessories
US20150222436A1 (en) 2014-02-06 2015-08-06 Nagravision S.A. Techniques for securing networked access systems
US9640005B2 (en) 2014-02-11 2017-05-02 Gentex Corporation Systems and methods for adding a trainable transceiver to a vehicle
US10192377B2 (en) 2014-02-12 2019-01-29 Elika Access Systems, Llc Movable barrier operator configured for remote actuation
US10997547B2 (en) 2014-02-18 2021-05-04 Hall Labs Llc System and method for detecting potentially unauthorized access to an enclosure
US20150235172A1 (en) 2014-02-18 2015-08-20 David R. Hall System and Method for Detecting Potentially Unauthorized Access to an Enclosure
US20150235495A1 (en) 2014-02-18 2015-08-20 David R. Hall System and Method for Partially Opening an Access Barrier
US20180285814A1 (en) 2014-02-18 2018-10-04 David R. Hall System and method for detecting potentially unauthorized access to an enclosure
US20180367419A1 (en) 2014-02-18 2018-12-20 David R. Hall Automated tracking-number based administration of access codes
US20150235173A1 (en) 2014-02-18 2015-08-20 David R. Hall Automated Tracking-Number Based Administration of Access Codes
KR102139546B1 (en) 2014-03-11 2020-07-30 삼성전자주식회사 Mobile system including firmware verification function and firmware update method thereof
US20150310737A1 (en) 2014-04-09 2015-10-29 Haws Corporation Traffic control system and method of use
CN107004341B (en) 2014-04-18 2019-12-20 金泰克斯公司 Trainable transceiver and cloud computing system architecture systems and methods
US9805589B2 (en) 2014-04-18 2017-10-31 Gentex Corporation Trainable transceiver and camera systems and methods
EP3132433B1 (en) 2014-04-18 2020-01-01 Gentex Corporation Trainable transceiver system
EP3132432B1 (en) 2014-04-18 2020-01-01 Gentex Corporation Trainable transceiver
EP3132435B1 (en) 2014-04-18 2020-06-03 Gentex Corporation Trainable transceiver and mobile communications device diagnostic systems and methods
US9916769B2 (en) 2014-04-24 2018-03-13 Gentex Corporation Identification method for training vehicle accessory
US9652907B2 (en) 2014-05-08 2017-05-16 Gentex Corporation Fixed location based trainable transceiver for the control of remote devices systems and methods
WO2015191732A1 (en) 2014-06-11 2015-12-17 Gentex Corporation Trainable transceiver systems and methods for channel frequency offset adjustment
CN106575468A (en) 2014-07-04 2017-04-19 马里奥·布波 System and method for the remote control of the shared access to one or more items
US9315108B2 (en) 2014-07-08 2016-04-19 Toyota Jidosha Kabushiki Kaisha Vehicle function determination
WO2016012627A1 (en) 2014-07-25 2016-01-28 Huf Hülsbeck & Fürst Gmbh & Co. Kg Method for configuring a tire pressure sensor
US9576408B2 (en) 2014-07-30 2017-02-21 Gentex Corporation Battery powered trainable remote garage door opener module
EP3178144B1 (en) 2014-08-06 2018-12-19 Gentex Corporation Power supply for vehicle based trainable transceiver
CN107074170B (en) 2014-10-08 2020-01-31 金泰克斯公司 Trainable transceiver utilizing existing vehicle user interface and method of operation
EP3204264A4 (en) 2014-10-08 2017-10-04 Gentex Corporation Secondary security and authentication for trainable transceiver
US9811958B1 (en) 2014-11-04 2017-11-07 David R. Hall Apparatus enabling secure wireless access to an enclosure
US10922642B2 (en) 2014-11-04 2021-02-16 Hall Labs Llc System and method for linking an event to video documenting the event
US10373503B2 (en) 2015-01-09 2019-08-06 Gentex Corporation Trainable transceiver with single camera park assist
US9680646B2 (en) 2015-02-05 2017-06-13 Apple Inc. Relay service for communication between controllers and accessories
US9836955B2 (en) 2015-03-09 2017-12-05 Gentex Corporation Trainable transceiver for communication to a fixed or mobile receiver
US9836956B2 (en) 2015-03-10 2017-12-05 Gentex Corporation Trainable transceiver with orientation based antenna power control
WO2016145013A1 (en) 2015-03-10 2016-09-15 Gentex Corporation Increasing radio frequency power of activation messages by adding dead time
US9715825B2 (en) 2015-04-29 2017-07-25 Gentex Corporation Trainable transceiver with hands free image based operation
US9418326B1 (en) 2015-04-30 2016-08-16 International Business Machines Corporation Enhanced quick response codes
CN107920784B (en) 2015-08-28 2021-02-26 金泰克斯公司 Vehicle security accessory and identity authentication method
CN107924611A (en) 2015-09-14 2018-04-17 金泰克斯公司 Trainable transceiver and user's checking based on vehicle
CN108136963B (en) 2015-10-22 2021-04-27 金泰克斯公司 Integrated vehicle communication system and method
US9791861B2 (en) 2015-11-12 2017-10-17 International Business Machines Corporation Autonomously servicing self-driving vehicles
GB201604868D0 (en) 2016-03-22 2016-05-04 Bybox Holdings Ltd Automated locker system and method for delivery and collection of packages
US10062229B2 (en) 2016-04-29 2018-08-28 Faraday & Future Inc. Integrated garage door opener for connected vehicle
EP3446299A4 (en) 2016-06-07 2019-03-13 Gentex Corporation Vehicle trainable transceiver for allowing cloud-based transfer of data between vehicles
WO2017218946A1 (en) 2016-06-17 2017-12-21 Gentex Corporation Systems and methods for universal toll module
US20170372574A1 (en) 2016-06-24 2017-12-28 Qualcomm Incorporated Beacon-augmented surveillance systems and methods
US9811085B1 (en) 2016-08-18 2017-11-07 Allstate Insurance Company Generating and transmitting parking instructions for autonomous and non-autonomous vehicles
US20180053237A1 (en) 2016-08-18 2018-02-22 Allstate Insurance Company Generating and Transmitting Parking Instructions for Autonomous and Non-Autonomous Vehicles
US11425530B2 (en) 2016-08-18 2022-08-23 Allstate Insurance Company Generating and transmitting parking instructions for autonomous and non-autonomous vehicles
WO2018085519A2 (en) 2016-11-02 2018-05-11 Witricity Corporation Vehicle charger network
CN109952774B (en) 2016-12-22 2022-09-09 金泰克斯公司 Activation of wireless modules using magnetic field data
US10510244B2 (en) 2017-02-06 2019-12-17 Gentex Corporation Selective transmission of commands associated with a single transceiver channel
EP3555873B1 (en) 2017-02-10 2020-11-11 Gentex Corporation Trainable transceiver for training and controlling multiple functions with a single channel
US10412581B2 (en) * 2017-02-14 2019-09-10 Ford Global Technologies, Llc Secure session communication between a mobile device and a base station
KR20180098017A (en) 2017-02-24 2018-09-03 엘지전자 주식회사 Mobile terminal and method for controlling the same
US10268201B2 (en) 2017-02-28 2019-04-23 Mitsubishi Electric Research Laboratories, Inc. Vehicle automated parking system and method
US9879466B1 (en) 2017-04-18 2018-01-30 Chengfu Yu Garage door controller and monitoring system and method
US11055942B2 (en) 2017-08-01 2021-07-06 The Chamberlain Group, Inc. System and method for facilitating access to a secured area
US10848719B2 (en) 2017-09-13 2020-11-24 Alarm.Com Incorporated System and method for gate monitoring during departure or arrival of an autonomous vehicle
US10614650B2 (en) 2017-09-20 2020-04-07 Bradford A. Minsley System and method for managing distributed encrypted combination over-locks from a remote location
US10652743B2 (en) 2017-12-21 2020-05-12 The Chamberlain Group, Inc. Security system for a moveable barrier operator
US10455029B2 (en) 2017-12-29 2019-10-22 Dish Network L.L.C. Internet of things (IOT) device discovery platform
US10366555B1 (en) 2018-01-25 2019-07-30 Xerox Corporation Electromechanical lock security system
US10217303B1 (en) 2018-05-21 2019-02-26 Hall Labs Llc System and method for delivery of goods with automatic access code expiration
US11074773B1 (en) 2018-06-27 2021-07-27 The Chamberlain Group, Inc. Network-based control of movable barrier operators for autonomous vehicles
US10783479B2 (en) 2018-07-18 2020-09-22 Hall Labs Llc System and method for delivering a package
WO2020028502A1 (en) 2018-08-01 2020-02-06 The Chamberlain Group, Inc. Movable barrier operator and transmitter pairing over a network
US20200074753A1 (en) 2018-08-31 2020-03-05 Sadashiv Adiga Electromechanically coupled barrier, method, and system to provide temporary access to a parking garage and a secure physical space of the parking garage
US10553050B1 (en) 2018-12-17 2020-02-04 One Step Shot, LLC System to register users to pre-authorize them to enter preselect locations
US11313168B2 (en) 2018-12-31 2022-04-26 William Kyle Virgin Universal add-on devices for feature enhancement of openers for movable barriers
US10997810B2 (en) 2019-05-16 2021-05-04 The Chamberlain Group, Inc. In-vehicle transmitter training
US11908260B2 (en) 2020-05-18 2024-02-20 Gentex Corporation System for authorizing communication system to control remote device

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4779090A (en) * 1986-08-06 1988-10-18 Micznik Isaiah B Electronic security system with two-way communication between lock and key
US6154544A (en) * 1995-05-17 2000-11-28 The Chamberlain Group, Inc. Rolling code security system
CA2443452A1 (en) * 1995-05-17 1996-11-21 The Chamberlain Group, Inc. Rolling code security system
US20040066936A1 (en) * 1995-05-17 2004-04-08 The Chamberlain Group, Ltd. Rolling code security system
US5937065A (en) * 1997-04-07 1999-08-10 Eaton Corporation Keyless motor vehicle entry and ignition system
EP0870889A2 (en) * 1997-04-07 1998-10-14 Eaton Corporation Keyless motor vehicle entry and ignition system
US20030033540A1 (en) * 2001-08-09 2003-02-13 The Chamberlain Group, Inc. Method and apparatus for a rolling code learning transmitter
CN101160557A (en) * 2005-04-19 2008-04-09 约翰逊控制技术公司 System and method for training a trainable transmitter and a remote control system receiver
CN101248462A (en) * 2005-08-24 2008-08-20 韦恩达尔顿公司 System and methods for automatically moving access barriers initiated by mobile transmitter devices
CN101390138A (en) * 2006-01-03 2009-03-18 约翰逊控制技术公司 Transmitter and method for transmitting an RF control signal
CN101221692A (en) * 2007-01-12 2008-07-16 李尔公司 Voice programmable and voice activated vehicle-based appliance remote control
WO2011106199A1 (en) * 2010-02-25 2011-09-01 The Chamberlain Group, Inc. Method and apparatus for training a learning movable barrier operator transceiver
CN107466463A (en) * 2014-10-13 2017-12-12 自动化科技(澳大利亚)有限公司 Remote supervisory and controlling syste for barrier operating device
CN104464057A (en) * 2014-12-17 2015-03-25 江苏合智同创电子科技有限公司 Hopping encoding method for car entrance guard system

Also Published As

Publication number Publication date
US11122430B2 (en) 2021-09-14
EP3729386A1 (en) 2020-10-28
KR20200113193A (en) 2020-10-06
US20210385651A1 (en) 2021-12-09
US11778464B2 (en) 2023-10-03
WO2019126453A1 (en) 2019-06-27
KR102652153B1 (en) 2024-03-28
US20200236552A1 (en) 2020-07-23
KR20240042188A (en) 2024-04-01
US12108248B2 (en) 2024-10-01
CN111837165B (en) 2024-03-19
US20230354025A1 (en) 2023-11-02
AU2024213144A1 (en) 2024-09-12
CA3236659A1 (en) 2019-06-27
CA3085470A1 (en) 2019-06-27
CN118135696A (en) 2024-06-04
US10652743B2 (en) 2020-05-12
US20190200225A1 (en) 2019-06-27
KR102466493B1 (en) 2022-11-11
KR20220155611A (en) 2022-11-23
AU2018388665A1 (en) 2020-07-09
AU2018388665B2 (en) 2024-06-20

Similar Documents

Publication Publication Date Title
CN111837165B (en) Safety system for movable barrier operator
JP2005312040A (en) Method for transmitting information between bidirectional objects
US20240005713A1 (en) Security System for a Moveable Barrier Operator
JP6633401B2 (en) Electronic lock system
US20240141714A1 (en) Security system for a moveable barrier operator
CN208834479U (en) Thief-proof code remote controler identification device
US20240144761A1 (en) Security system for a moveable barrier operator
US20240084637A1 (en) Security system for a moveable barrier operator
KR20150066345A (en) Control system using mobile devic of water treatment plant and administration method
JPH1088879A (en) Identification signal reference device and identification signal reference method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Illinois, America

Applicant after: Chamberlain Group LLC

Address before: Illinois, America

Applicant before: Thrall Car Manufacturing Co.

GR01 Patent grant
GR01 Patent grant